Is It Time for a Mac Attack?

After years of successfully dodging the vast majority of viruses, spyware, ransomware and other malware typically directed at PCs, it seems that Mac may be nearing the critical mass necessary to attract cyberthieves. It’s definitely getting closer. According to AppleInsider, “In the fourth quarter of 2016, Apple saw a 4.5 percent increase in shipments…as the wider PC market fell further into the red.” To put it simply, Macs are becoming more popular, and that shouldn’t come as a surprise. Visit your local coffee house and you’ll probably find the vast majority of patrons are sipping their lattes while staring into…

Centrify’s Bug Bounty Program with Bugcrowd

It’s an exciting time to be in information security. Black hats are attacking more web sites, constructing more 0-day threats and phishing more credentials and payment data. The proliferation of smart IoT devices and new technologies create opportunities for malicious activities. Nation State actors and the vulnerabilities they exploit are gaining visibility. What strikes me, though, is how the security community has risen to these challenges. The demand for security professionals is higher than ever, but so is the supply — new generations of security researchers, responders and leaders are coming from all corners of the globe. These are people…

Time to Ditch Passwords: Taking the Centrify Message to Infosecurity Europe

London Olympia will again be the venue this week as experts from around the world flock to the capital for the annual Infosecurity Europe show. With over 13,000 visitors expected over the three days, this is one of the biggest industry events around. Centrify will be there on Stand C65 to share why we think our range of advanced identity services are the only way IT leaders can secure their hybrid enterprise against modern threats. Attendees also have a great opportunity to hear first-hand from customer Remy Cointreau on the challenges of becoming a more secure and agile organisation through…

Joining the Dots to Better Breach Prevention: A Centrify Roundtable

The volume and frequency of data breaches seem to have hit a new high in recent months. But away from the sensational headlines, do we really know what the impact of such incidents can be on the victim organisation’s reputation and bottom line? Centrify recently commissioned the Ponemon Institute to shine a light on exactly this area — interviewing CMOs, IT practitioners and customers — and uncovered some fascinating findings. Not only do UK firms on average see a lasting share price slump of 5% following a breach, but many IT and marketing professionals are profoundly divided –from each other…

Controlling Access is the Key to Cyber Security

Access is the greatest opportunity and the greatest threat for businesses engaging with the online economy. Increasingly, our business systems gather, digest and disperse data throughout our operations, including confidential details about customers, employees and business partners. Mature cyber security processes are vital to protect this confidential information from unauthorised access, which can expose businesses to punishing and potentially lethal brand damage. In fact, even a cursory review of 2016 cybersecurity breaches — including the Yahoo! billion-user revelations, the DNC hack during the U.S. presidential election and the $81 million malware attack against a Bangladeshi bank — reveal their unprecedented…

Why So Few Women in Cybersecurity?

I’ve seen quite a few articles lately on why there aren’t more women in cybersecurity. It’s a good question, but I think to answer that, we have to look at tech in general. First, let’s step back and acknowledge the progress that has been made. Today’s average tech company looks nothing like it did in the 1980s when I was earning a bachelor’s degree in computer science and then later a master’s degree in business. At that time, women working in any roles in technology were a minority. Today, that’s improved in a number of areas within tech including marketing,…

4 Reasons Why Security is Important for Innovation Management

Well, maybe we should start with, “What is innovation management anyways?” At its most basic, it is the purposeful organization and management of ideas within an organization to create meaningful change. Companies use it to gather new product ideas, improve processes and discover new markets and business models. The White House used innovation management processes to cut government spending, Home Depot used this process to identify new product lines, and the DREAMS Challenge used innovation management software to fund new projects that would halt the spread of HIV (just to name a few). But if innovation management often starts by…

Confronting the New Cyber Security Reality: Part 1

During the peak of the 2016 U.S. presidential election cycle, two groups of hackers accessed the Democratic National Convention servers. The leak made public emails detailing the DNC’s interactions with the media, both primary candidates’ campaigns and campaign contributions, and personal information about DNC donors, including credit card and Social Security numbers. This historical breach will forever be known for its impact on the 2016 Presidential election. Recently, we’ve seen the frequency of breaches like the DNC attack skyrocket—and no organization is safe. Over the past two years, sixty-six percent of organizations report experiencing five or more breaches, according to…

Ponemon 2017 Report: The Need for a New IT Security Architecture

It’s annual cybersecurity reporting season and first up in 2017 is the Ponemon Global Study, “The Need for a New IT Security Architecture” sponsored by Citrix. The study reveals global trends in IT security risks and reasons why security practices and policies need to evolve in order to deal with threats from disruptive technologies, cybercrime and compliance. Changes in the workplace and problems managing IT security are also increasing risks to the organization. This report surveyed more than 4000 global IT and security practitioners and discusses the findings that concern risks created by cybercrime, employee negligence and organizational dysfunction and…

RSA: Centrify Survey Reveals Almost Half of Respondents Lack Confidence in Their Company’s Cybersecurity Strategies

Yesterday, we conducted an onsite survey of IT professionals attending the RSA Conference, being held this week at Moscone Center, San Francisco. The poll asked respondents how their companies secure applications and infrastructures in the age of access, and it revealed that only slightly more than half (55%) believe their company’s current technology investment ensures their company’s cybersecurity. This leaves about half of respondents with a lack of confidence in their own organization’s corporate security! While this fact is startling, it shouldn’t be too surprising, since a recent Forrester study, commissioned by Centrify, confirms that in the past two years, two-thirds…