Centrify Identity Services: Securing Docker and Containers

Introduction We are excited to announce that Centrify now supports CoreOS Container Optimized Linux which several of our customers are using as part of their adoption of containerization for their application deployments. But first, let’s start with an overview of how Centrify can help you protect access to these containerized platforms and the applications that run on them. As organizations embrace hybrid cloud environments moving their applications and other workloads to public clouds such as AWS, Azure and Google, application developers building custom apps inevitably rework their applications to take advantage of the hosting platform capabilities such as auto-scaling enabling…

German Court: Employees Can Be Held Liable for Damages Caused by CEO Fraud

A German court has ruled that an employee can be held liable for damages caused by instances of CEO fraud that affect their employer. In October 2017, the Regional Labor Court of Saxony ruled that a financial director can be partially liable for the damage caused by a case of CEO fraud. Their accountability was ultimately limited however, the court found, because the liability privilege developed by German labor courts applies to CEO fraud. Under that common law, employees are responsible for damages only if they demonstrate gross negligence. While the employee did violate their employer’s internal safeguards, the court…

Centrify Achieves Advanced Partner Status in AWS Partner Network

We are proud to announce that Centrify has met the requirements and is now an Advanced Partner within the AWS Partner Network. Is this just another Partner announcement or is there something more here? What This Means for Customers First, for customers, Centrify becoming an Advanced Technology Partner means that they have been so rigorously tested that AWS personnel can recommend Centrify to AWS customers without reservation. AWS has put Centrify and its products/services through hours of testing and diligence, including talking to customer references, analyzing Centrify’s Identity Services, as well as establishing that Centrify on AWS meets all security…

Six Cybersecurity Questions for the C-Suite

Countless breaches of the past year demonstrate that C-suite executives and company directors must rethink their security. Earlier this year, Equifax saw its share price drop by 13 per cent within a day of revealing a data breach while last year Yahoo suffered a $350 million cut in its sale price to Verizon after reporting data breaches affecting one billion accounts — a number that was later increased to all three billion accounts with critical information stolen, including names, email addresses, telephone numbers, encrypted or unencrypted security questions and answers, dates of birth, and hashed passwords. The devastation of these incidents, alone,…

How To Lower Cyber Insurance Premiums

According to Lloyd’s of London, a massive global cyberattack could result in economic losses as high as $53 billion. Given that, it’s no surprise that an increasing number of businesses are adding cybersecurity coverage to their liability insurance. But as businesses rush to insure, what exactly these policies cover, as well as the cost of premiums, is coming under scrutiny. A key question is whether or not non-malicious human activity is covered. On one hand, cybersecurity policies that do not cover human error —  which would include falling victim to sophisticated phishing schemes, visiting Trojan-infected sites, or even deferring patches…

Cybersecurity Awareness Month: Protecting Critical Infrastructure from Cyber Threats

It is interesting and at times bewildering, that in the many years following the failures of 9/11, we still have not found a way to share threat intelligence information without exposing classified information which may compromise the source. Look at these five primary pieces of infrastructure, which exist in every modern society, consider the interdependencies, and how a persist threat or disruption to one dependency can cascade throughout these infrastructure dominos. Primary Role: Electrical Power Generation/Distribution Dependencies on: Above and below ground electrical distribution wires. Network Access to connect power generation and distribution systems. Backup generation systems for internal systems….