I learned fro the Cisco 2017 Midyear Cybersecurity Report that DevOps is a target and that least privilege and a platform approach is needed...Read More
When layered effectively, integrated fully and managed appropriately, point solutions are a winning approach.Read More
London Olympia will again be the venue this week as experts from around the world flock to the capital for the annual Infosecurity Europe...Read More
Adaptive authentication is the recognition that authentication elevation is part of a continuous process of managing access to applications...Read More
Reducing the friction for users through additional choices for second factors of authentication will go a long way toward not relying on...Read More
Google users were targeted by a spear phishing campaign.Read More
The GDPR will bring sweeping new rules into force, including new consumer rights over how personal data is used, & mandatory 72-hour data...Read More
Setting up controls can seem daunting, but these are simply growing pains that can easily be worked through to achieve great security...Read More
Ready to Protect Against the #1 Attack Vector?
Register for a 30-day trial of Centrify's Privileged Access Management (PAM) software to minimize your attack surface and control privileged access to your hybrid environment.