Too many organizations take the same approach that Governor Rauner’s plan has taken to cover only part of the organization and a select...Read More
Since 2013, breaches have compromised nearly six billion records It’s time to face the facts. Today’s security is no longer secure.Read More
This specific attack should serve as a wakeup call to rethink how secure the virtual machine layer truly is.Read More
RSA: Centrify Survey Reveals Almost Half of Respondents Lack Confidence in Their Company’s Cybersecurity Strategies
Eighty percent of organizations need to employ better IAM practices to stop the breaches now. It is time to rethink your security and secure...Read More
The NCSC will be a great resource going forward. But we need a laser-focus on IAM.Read More
Before we go into how Multi-factor authentication (MFA) has changed, let’s have a quick look at what MFA is.With MFA, users must provide two...Read More
In this blog, however, I want to explore how you can leverage your on-premises Active Directory (AD) infrastructure to authenticate users to...Read More
Ready to Protect Against the #1 Attack Vector?
Register for a 30-day trial of Centrify's Privileged Access Management (PAM) software to minimize your attack surface and control privileged access to your hybrid environment.