recentpopularlog in

jonerp : centrify   31

Why Your Biometrics Are Your Best Password
"Today everyone lives in a multi-factor authentication (MFA) world where cybersecurity technologists have added another factor: “something you are.” This is where biometrics come in, and facial recognition, fingerprint scanning, retinal scanning, and other forms of bio-identification have become normal thanks to technologies like Apple’s Touch ID and Face ID. Many people have already been using these technologies for years on their iPhones.

The reality is that these additional factors based on “something you have” or “something you are” are both much stronger than “something you know,” such as a password or PIN. Not only can the latter be easily stolen, guessed, or phished for, but authentication based on biometrics is very hard to fake or duplicate."
business  featured  posts  technology  software  trends  &  concepts  apple  biometrics  face  id  apple’s  touch  centrify  entrust  datacard  fido2 
12 days ago by jonerp
Five Interesting Takeaways From RSA Conference 2020
"Cloud-based security information and event management (SIEM) systems capable of integrating with 3rd party public cloud platforms reflect the maturity nature of this market. Of the several vendors claiming to have cloud-based SIEM, Microsoft’s Azure Sentinel’s demo showed in real-time how fusion AI technology can parse large volumes of low fidelity signals into a few important incidents for SecOps teams to focus on. Microsoft said that in December 2019 alone, Azure Sentinel evaluated nearly 50 billion suspicious signals, isolating them down to just 25 high-confidence incidents for SecOps teams to investigate."
business  featured  posts  technology  software  trends  &  concepts  absolute  endpoint  security  api  centrify  pam  cetnrify  cybersecurity  louis  columbus'  blog 
15 days ago by jonerp
10 Ways To Own Your Cybersecurity In 2020
"Vault away passwords to critical systems and data. In the privileged access world of Cybersecurity operations in any organization, password vaults have become commonplace. Password vaults are similar to password managers many people use for their personal devices, web applications, and sites they regularly visit. In the case of a password vault, privileged credentials are checked in and out by admins, with each password automatically rotating to ensure greater randomization."
business  featured  posts  technology  software  trends  &  concepts  amazon  echo  bring-your-own-device  centrify  zero  trust  privilege.  cybersecurity  dashlane  google  home  lastpass 
8 weeks ago by jonerp
7 Signs It’s Time To Get Focused On Zero Trust
"69% of employees doubt the cybersecurity processes in place in their organizations today. When the majority of employees don’t trust the security processes in place in an organization, they invent their own, often bringing their favorite security solutions into an enterprise. Shadow IT proliferates, productivity often slows down, and enterprise is more at risk of a breach than ever before. When there’s no governance or structure to managing data, cybercriminals flourish."
business  featured  posts  technology  software  trends  &  concepts  breach  breaches  centrify  cybersecurity  hackers  louis  columbus'  blog  passwords 
november 2019 by jonerp
Securing Multi-Cloud Manufacturing Systems In A Zero Trust World
"To stop the cybercriminals’ gold rush, merged manufacturing businesses need to take the first step of adopting an approach to secure each acquired company’s identity repositories, whether on-premises or in the cloud. For example, instead of having to reproduce or continue to manage the defined rights and roles for users in each AD, manufacturing conglomerates can better secure their combined businesses using a Multi-Directory Brokering approach."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  enterprise  resource  planning  erp  louis  columbus'  blog  manufacturing  private  equity  firms 
november 2019 by jonerp
Why Manufacturing Supply Chains Need Zero Trust
"Supply chains are renowned for how unsecured and porous they are multiple layers deep. That’s because manufacturers often only password-protect administrator access privileges for trusted versus untrusted domains at the operating system level of Windows NT Server, haven’t implemented multi-factor authentication (MFA), and apply a trust but verify mindset only for their top suppliers. Many manufacturers don’t define, and much less enforce, supplier security past the first tier of their supply chains, leaving the most vulnerable attack vectors unprotected."
business  featured  posts  technology  software  trends  &  concepts  centrify  privileged  access  management  cybersecurity  louis  columbus'  blog  zero  trust  privilege  security 
september 2019 by jonerp
The Truth About Privileged Access Security On AWS And Other Public Clouds
"In short, native IAM capabilities offered by AWS, Microsoft Azure, Google Cloud, and more provides enough functionality to help an organization get up and running to control access in their respective homogeneous cloud environments. Often they lack the scale to fully address the more challenging, complex areas of IAM and PAM in hybrid or multi-cloud environments."
business  featured  posts  technology  software  trends  &  concepts  amazon  web  services  aws  cybersecurity  security  centrify  louis  columbus'  blog 
august 2019 by jonerp
Your Mobile Phone Is Your Identity. How Do You Protect It?
"Accidental, inadvertent breaches from human error and system glitches are still the root cause for nearly half (49%) of the data breaches. And phishing attacks on mobile devices that are lost, stolen or comprised in workplaces are a leading cause of breaches due to human error."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  louis  columbus'  blog  mobileiron  zero  trust  privilege  security 
august 2019 by jonerp
How To Deal With Ransomware In A Zero Trust World
"Ransomware attackers are becoming more sophisticated using spear-phishing emails that target specific individuals and seeding legitimate websites with malicious code – it’s helpful to know the anatomy of an attack. Some recent attacks have even started exploiting smartphone vulnerabilities to penetrate corporate networks, according to Dr. George."
business  featured  posts  technology  software  trends  &  concepts  centrify  privileged  access  management  cybersecurity  louis  columbus'  blog  zero  trust  privilege  security 
august 2019 by jonerp
Roadmap To Zero Trust For Small Businesses
"Small businesses and startups run so fast there’s often a perception that achieving greater security will slow them down. In a Zero Trust world, they don’t need to spend a lot of sacrifice speed for security. Following a Zero Trust roadmap can protect their systems, valuable intellectual property, and valuable time by minimizing the risk of falling victim to costly breaches.

Here’s what small businesses and startups need to include on their Zero Trust roadmaps"
business  featured  posts  technology  software  trends  &  concepts  centrify  privileged  access  management  cybersecurity  louis  columbus'  blog  zero  trust  privilege  security 
july 2019 by jonerp
Why AI Is The Future Of Cybersecurity
"Fraud detection, malware detection, intrusion detection, scoring risk in a network, and user/machine behavioral analysis are the five highest AI use cases for improving cybersecurity. Capgemini analyzed 20 use cases across information technology (IT), operational technology (OT) and the Internet of Things (IoT) and ranked them according to their implementation complexity and resultant benefits (in terms of time reduction). Based on their analysis, we recommend a shortlist of five high-potential use cases that have low complexity and high benefits. 54% of enterprises have already implemented five high impact cases. The following graphic compares the recommended use cases by the level of benefit and relative complexity."
business  featured  posts  technology  software  trends  &  concepts  absolute  ai  centrify  cybersecurity  kount  louis  columbus'  blog  mobileiron 
july 2019 by jonerp
Passwords Are The Weakest Defense In A Zero Trust World
"These and many other fascinating insights make it clear that passwords are now the weakest defense anyone can rely on in a Zero Trust world. Two recent research studies quantify just how weak and incomplete an IT security strategy based on passwords is, especially when the need to access mobile apps is proliferating. Combined, these two MobileIron reports pack a one-two punch at passwords, and how they’re not strong enough alone to protect mobile devices, the fastest proliferating threat surface in a Zero Trust world."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  louis  columbus'  blog  mobileiron  zero  trust  security 
july 2019 by jonerp
How The Top 21% Of PAM-Mature Enterprises Are Thwarting Privileged Credential Breaches
"Energy, Technology & Finance are the most mature industries adopting Privileged Access Management (PAM), outscoring peer industries by a wide margin. Government, Education, and Manufacturing are the industries most lagging in their adoption of Zero Trust Privilege (ZTP), making them the most vulnerable to breaches caused by privileged credential abuse. Education and Manufacturing are the most vulnerable industries of all, where it’s common for multiple manufacturing sites to use shared accounts for controlling privileged access. The study found shared accounts for controlling privileged access is commonplace, with 52% of all organizations reporting this occurring often. Presented below are the relative levels of Zero Trust Privilege Maturity by demographics, with the largest organizations having the most mature approaches to ZTP, which is expected given the size and scale of their IT and cybersecurity departments."
business  featured  posts  technology  software  trends  &  concepts  centrify  2019  zero  trust  privilege  maturity  model  report  louis  columbus'  blog  pam  privileged  access  credential  abuse  credentials  management 
june 2019 by jonerp
How to Improve Privileged User’s Security Experiences With Machine Learning
"Every business is facing the paradox of hardening security without sacrificing users’ login and system access experiences. Zero Trust Privilege is emerging as a proven framework for thwarting privileged credential abuse by verifying who is requesting access, the context of the request, and the risk of the access environment across every threat surface an organization has."
business  featured  posts  technology  software  trends  &  concepts  centrify  louis  columbus'  blog  machine  learning  zero  trust  privilege  security  ztp  zts 
june 2019 by jonerp
How To Improve Supply Chains With Machine Learning: 10 Proven Ways
"Machine learning-based algorithms are the foundation of the next generation of logistics technologies, with the most significant gains being made with advanced resource scheduling systems. Machine learning and AI-based techniques are the foundation of a broad spectrum of next-generation logistics and supply chain technologies now under development. The most significant gains are being made where machine learning can contribute to solving complex constraint, cost and delivery problems companies face today."
business  featured  posts  technology  software  trends  &  concepts  analytics  artificial  intelligence  centrify  erp  infor  inspectorio  louis  columbus'  blog 
may 2019 by jonerp
How To Secure Mobile Devices In A Zero Trust World
"Hacker’s favorite way to gain access to any business is by using privileged access credentials, which are increasingly being harvested from cellphones using malware. Hacking organizations would rather walk in the front door of any organizations’ systems rather than expend the time and effort to hack in. It’s by far the most popular approach with hackers, with 74% of IT decision makers whose organizations have been breached in the past say it involved privileged access credential abuse according to a recent Centrify survey, Privileged Access Management in the Modern Threatscape."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  forrester  zero  trust  framework  identity  access  management  louis  columbus'  blog  machine  learning  mobileiron 
may 2019 by jonerp
CIO’s Guide To Stopping Privileged Access Abuse – Part 2
"Enterprise security approaches based on Zero Trust continue to gain more mindshare as organizations examine their strategic priorities. CIOs and senior management teams are most focused on securing infrastructure, DevOps, cloud, containers, and Big Data projects to stop the leading cause of breaches, which is privileged access abuse."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  enterprise  gartner  top  10  security  projects  for  2018  louis  columbus'  blog  privileged  access  abuse  management 
may 2019 by jonerp
CIO’s Guide To Stopping Privileged Access Abuse – Part I
"The following are five strategies CIOs need to concentrate on to stop privileged credential abuse. Starting with an inventory of privileged accounts and progressing through finding the gaps in IT infrastructure that create opportunities for privileged credential abuse, CIOs and their teams need to take preemptive action now to avert potential breaches in the future."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  gartner  louis  columbus'  blog  privileged  access  management  in  the  modern  threatscape  credential  abuse 
april 2019 by jonerp
5 Things Every Executive Needs To Know About Identity And Access Management
"Executives have a strong sense of urgency to improve Identity and Access Management (IAM) today to assure the right individuals access the right resources at the right times and for the right reasons. IAM components like Access Management, Single Sign-On, Customer Identity and Access Management (CIAM), Advanced Authentication, Identity Governance and Administration (IGA), IoT-Driven IAM, and Privileged Access Management address the need to ensure appropriate access to resources across an organization’s entire attack surface and to meet compliance requirements."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  identity  and  access  management  louis  columbus'  blog  mfa  multi-factor  authentication  pam 
april 2019 by jonerp
5 Ways To Demystify Zero Trust Security
"To Chase Cunningham’s point, more customer use cases need to be created, and thankfully that’s on his research agenda. Starting the conversation with each vendor visited by asking for their definition of Zero Trust either led to a debate of whether Zero Trust was needed in the industry or how their existing architecture could morph to fit the framework. Booth staffs at the following companies deserve to be commended for how much they know about their customers’ success with Zero Trust: Akamai, Centrify, Cisco, Microsoft, MobileIron, Palo Alto Networks, Symantec, and Trend Micro."
business  featured  posts  technology  software  trends  &  concepts  akamai  capgemini  centrify  cisco  ledios  cyber  louis  columbus'  blog  microsoft 
march 2019 by jonerp
74% Of Data Breaches Start With Privileged Credential Abuse
"Enterprises who are prioritizing privileged credential security are creating a formidable competitive advantage over their peers, ensuring operations won’t be interrupted by a breach. However, there’s a widening gap between those businesses protected from a breach and the many who aren’t. In quantifying this gap consider the typical U.S.-based enterprise will lose on average $7.91M from a breach, nearly double the global average of $3.68M according to IBM’s 2018 Data Breach Study."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  ibm  2018  data  breach  study  louis  columbus'  blog  privileged  access  management  in  the  modern  threatscape  report  credential  abuse  security 
march 2019 by jonerp
Digital Transformation’s Missing Link Is Zero Trust
"Gaps exist between the results digital transformation initiatives are delivering today, and the customer-driven value they’re capable of. According to Gartner, 75% of digital transformation projects are not aligned internally today, leading to delayed new product launches, mediocre experiences, and greater security risks than ever before."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  louis  columbus'  blog  mobileiron  palo  alto  networks  privileged  access  management  (pam)  world  economic  forum 
february 2019 by jonerp
How To Protect Healthcare Records In A Zero Trust World
"Using access credentials stolen from co-workers or stolen laptops, unethical healthcare insiders are among the most prolific at stealing and selling patient data of any insider threat across any industry. Accenture’s study, “Losing the Cyber Culture War in Healthcare: Accenture 2018 Healthcare Workforce Survey on Cybersecurity,” found that the most common ways healthcare employees financially gain from stealing medical records is to commit tax return and credit card fraud."
business  featured  posts  technology  software  trends  &  concepts  centrify  healthcare  breaches  protenus  breach  barometer  idaptive  louis  columbus  privileged  access  credentials  zero  trust  privilege 
december 2018 by jonerp
86% Of Enterprises Increasing IoT Spending In 2019
"86% of enterprises expect to increase their spending on IoT in 2019 and beyond. Enterprises increased their investments in IoT by 4% in 2018 over 2017, spending an average of $4.6M this year. Nearly half of enterprises globally (49%) interviewed are aggressively pursuing IoT investments with the goal of digitally transforming their business models this decade. 38% of enterprises have company-wide IoT deployments today, and 55% have an IoT vision and are currently executing their IoT plans."
business  featured  posts  technology  software  trends  &  concepts  centrify  cisco  f5  idaptive  industrial  internet  of  things  intelligent  enterprise  index 
december 2018 by jonerp
How To Protect Healthcare IoT Devices In A Zero Trust World
"Healthcare and medical device manufacturers need to start taking action now to secure these devices during the research and development, design and engineering phases of their next generation of IoT products. Specifying and validating that every IoT access point is compatible and can scale to support Zero Trust Security (ZTS) is essential if the network of devices being designed and sold will be secure. ZTS is proving to be very effective at thwarting potential breach attempts across every threat surface an organization has. Its four core pillars include verifying the identity of every user, validating every device, limiting access and privilege, and utilizing machine learning to analyze user behavior and gain greater insights from analytics."
business  featured  posts  technology  software  trends  &  concepts  accenture  capgemini  centrify  healthcare  internet  of  things  (iot)  iot  louis  columbus'  blog 
november 2018 by jonerp
The Current State Of Cybersecurity Shows Now Is The Time For Zero Trust
"
41% of total breaches in 2017 targeted the healthcare industry, making it the most popular target for breach attempts.
Personally Identifiable Information (PII) combined with user credentials tops the percentage of breaches with 29% according to Wipro’s report.
88 records were lost or stolen every second in 2017 according to Wipro’s analysis.
Machine learning & AI are the second highest ranking security competencies for the future."
business  featured  posts  technology  software  trends  &  concepts  centrify  cisco  cybersecurity  f5  louis  columbus  palto  alto  networks  wipro 
october 2018 by jonerp
Identities Are The New Security Perimeter
"18% of healthcare employees are willing to sell confidential data to unauthorized parties for as little as $500 to $1,000, and 24% of employees know of someone who has sold privileged credentials to outsiders, according to a recent Accenture survey.
Privileged credentials for accessing an airport’s security system were recently for sale on the Dark Web for just $10, according to McAfee."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  louis  columbus'  blog  next-gen  access  zero  trust  security 
august 2018 by jonerp
IBM’s 2018 Data Breach Study Shows Why We’re In A Zero Trust World Now
"The report is a quick read and the data provided is fascinating. One can’t help but reflect on how legacy security technologies designed to protect digital businesses decades ago isn’t keeping up with the scale, speed and sophistication of today’s breach attempts. The most common threat surface attacked is compromised privileged credential access. 81% of all breaches exploit identity according to an excellent study from Centrify and Dow Jones Customer Intelligence, CEO Disconnect is Weakening Cybersecurity (31 pp, PDF, opt-in)."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  enterprise  security  ibm  2018  cost  of  a  data  breach  study  louis  columbus  next-gen  access 
august 2018 by jonerp
Zero Trust Security Update From The SecurIT Zero Trust Summit
"Identities, not systems, are the new security perimeter for any digital business, with 81% of breaches involving weak, default or stolen passwords. Tom Kemp, Co-Founder, and CEO, Centrify, provided key insights into the current state of enterprise IT security and how existing methods aren’t scaling completely enough to protect every application, endpoint, and infrastructure of any digital business. He illustrated how $86B was spent on cybersecurity, yet a stunning 66% of companies were still breached. Companies targeted for breaches averaged five or more separate breaches already. The following graphic underscores how identities are the new enterprise perimeter, making NGA and ZTS a must-have for any digital business."
business  featured  posts  technology  software  byline=louis  columbus  centrify  cio  cso  cybersecurity  machine-learning  based  security  next-gen  access  nga 
july 2018 by jonerp
Analytics Are Empowering Next-Gen Access And Zero Trust Security
"Machine learning-based NGA platforms including Centrify calculate a risk score that quantifies the relative level of trust based on every access attempt across an IT infrastructure. NGA platforms rely on machine learning algorithms to continuously learn and generate contextual intelligence that is used to streamline verified user’s access while thwarting many potential threats ― the most common of which is compromised credentials. IT security teams can combine the insights gained from machine learning, user profiles, and contextual intelligence to fine-tune the variables and attributes that calculate risk scores using cloud-enabled analytics services.
business  featured  posts  technology  software  byline=louis  columbus  centrify  analytics  service  next-gen  access  nga  verizon  mobile  security  index  2018  report  zero  trust 
july 2018 by jonerp
Three Ways Machine Learning Is Revolutionizing Zero Trust Security
"Zero Trust Security provides digital businesses with the security strategy they need to keep growing by scaling across each new perimeter and endpoint created as a result of growth. ZTS in the context of Next-Gen Access is built on four main pillars: (1) verify the user, (2) validate their device, (3) limit access and privilege, and (4) learn and adapt. The fourth pillar heavily relies on machine learning to discover risky user behavior and apply for conditional access without impacting user experience by looking for contextual and behavior patterns in access data."
business  featured  posts  technology  software  centrify  enterprise  security  louis  columbus  machine  learning  next-gen  access  zero  trust  zts 
may 2018 by jonerp

Copy this bookmark:





to read