Hey identity geeks, if you have been in the identity industry for a while like I have – yikes, 19 years – then you may remember one of the...Read More
Last week, Centrify published a new report about the increasing risk organizations are under as they migrate to the cloud. Specifically, we...Read More
Ransomware attacks like the ones that wreaked havoc in Baltimore, Maryland, Albany, New York, and Genesee County, Michigan are dominating...Read More
While phishing attacks continue to jeopardize today’s organizations (a reported 76% of organizations experienced phishing attacks in 2017),...Read More
It’s sometimes easy to forget that the younger employees of today are the managers of tomorrow. If we fail to understand how they use...Read More
I read with interest AIG’s 2017 Cyber Insurance Review. In a one sentence summary: cyber insurance claims are up, due to systemic ransomware...Read More
With the GDPR compliance deadline of May 25 almost upon us, recent events have highlighted the importance of locking down third-party risk....Read More
Ready to Protect Against the #1 Attack Vector?
Register for a 30-day trial of Centrify's Privileged Access Management (PAM) software to minimize your attack surface and control privileged access to your hybrid environment.