Featured Posts


Time to Take Cybersecurity Seriously
Programs like the CDM program and thought leadership from groups like the ICIT will have a major impact on organizations to take the theatre...
Read More

Will “Security Fatigue” Inevitably Overwhelm Your Organization?
“Security fatigue” is a growing concept within cybersecurity circles: experts report that the sustained threat of malicious attacks is...
Read More

Solving DHS Continuous Diagnostics and Mitigation (CDM) Phase 2
Centrify’s Identity Platform addresses not only credential and authentication requirements of CDM but also additional access controls...
Read More

The Great Gig in the Sky: Secure Hybrid Cloud
Every day I hear from companies concerned and frustrated over a specific challenge -- how to stand up workloads in the cloud while...
Read More

Top Three New Year's Security Resolutions
So these are my three security resolutions for 2017. Think Differently, act now and make 2017 the year of 2FA and find out what your company...
Read More

Single-factor Authentication (SFA) vs. Multi-factor Authentication (MFA)
This blog will discuss the what single-factor authentication (SFA), two-factor authentication (2FA) and multi-factor authentication (MFA)...
Read More