recentpopularlog in

jonerp : next-gen   6

Identities Are The New Security Perimeter
"18% of healthcare employees are willing to sell confidential data to unauthorized parties for as little as $500 to $1,000, and 24% of employees know of someone who has sold privileged credentials to outsiders, according to a recent Accenture survey.
Privileged credentials for accessing an airport’s security system were recently for sale on the Dark Web for just $10, according to McAfee."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  louis  columbus'  blog  next-gen  access  zero  trust  security 
august 2018 by jonerp
IBM’s 2018 Data Breach Study Shows Why We’re In A Zero Trust World Now
"The report is a quick read and the data provided is fascinating. One can’t help but reflect on how legacy security technologies designed to protect digital businesses decades ago isn’t keeping up with the scale, speed and sophistication of today’s breach attempts. The most common threat surface attacked is compromised privileged credential access. 81% of all breaches exploit identity according to an excellent study from Centrify and Dow Jones Customer Intelligence, CEO Disconnect is Weakening Cybersecurity (31 pp, PDF, opt-in)."
business  featured  posts  technology  software  trends  &  concepts  centrify  cybersecurity  enterprise  security  ibm  2018  cost  of  a  data  breach  study  louis  columbus  next-gen  access 
august 2018 by jonerp
Zero Trust Security Update From The SecurIT Zero Trust Summit
"Identities, not systems, are the new security perimeter for any digital business, with 81% of breaches involving weak, default or stolen passwords. Tom Kemp, Co-Founder, and CEO, Centrify, provided key insights into the current state of enterprise IT security and how existing methods aren’t scaling completely enough to protect every application, endpoint, and infrastructure of any digital business. He illustrated how $86B was spent on cybersecurity, yet a stunning 66% of companies were still breached. Companies targeted for breaches averaged five or more separate breaches already. The following graphic underscores how identities are the new enterprise perimeter, making NGA and ZTS a must-have for any digital business."
business  featured  posts  technology  software  byline=louis  columbus  centrify  cio  cso  cybersecurity  machine-learning  based  security  next-gen  access  nga 
july 2018 by jonerp
Analytics Are Empowering Next-Gen Access And Zero Trust Security
"Machine learning-based NGA platforms including Centrify calculate a risk score that quantifies the relative level of trust based on every access attempt across an IT infrastructure. NGA platforms rely on machine learning algorithms to continuously learn and generate contextual intelligence that is used to streamline verified user’s access while thwarting many potential threats ― the most common of which is compromised credentials. IT security teams can combine the insights gained from machine learning, user profiles, and contextual intelligence to fine-tune the variables and attributes that calculate risk scores using cloud-enabled analytics services.
business  featured  posts  technology  software  byline=louis  columbus  centrify  analytics  service  next-gen  access  nga  verizon  mobile  security  index  2018  report  zero  trust 
july 2018 by jonerp
Three Ways Machine Learning Is Revolutionizing Zero Trust Security
"Zero Trust Security provides digital businesses with the security strategy they need to keep growing by scaling across each new perimeter and endpoint created as a result of growth. ZTS in the context of Next-Gen Access is built on four main pillars: (1) verify the user, (2) validate their device, (3) limit access and privilege, and (4) learn and adapt. The fourth pillar heavily relies on machine learning to discover risky user behavior and apply for conditional access without impacting user experience by looking for contextual and behavior patterns in access data."
business  featured  posts  technology  software  centrify  enterprise  security  louis  columbus  machine  learning  next-gen  access  zero  trust  zts 
may 2018 by jonerp
How Zero Trust Security Fuels New Business Growth
"Zero Trust Security (ZTS) strategies enabled by Next-Gen Access (NGA) are indispensable for assuring uninterrupted digital business growth, and are proving to be a scalable security framework for streamlining onboarding and systems access for sales channels, partners, patients, and customers of fast-growing businesses."
business  featured  posts  technology  software  byline=louis  columbus  enteprise  security  gdpr  next-gen  access  zero  trust 
may 2018 by jonerp

Copy this bookmark:





to read