Please turn on your JavaScript for this page to function normally.
Centrify spins out IDaaS business as Idaptive

Centrify is spinning out its IDaaS business as a standalone company named Idaptive. Centrify is sharpening its focus on redefining the legacy approach to Privileged Access …

fence
Adopting a Zero Trust approach is the best strategy to control access

A new study conducted by Forrester Consulting found that organizations powering Zero Trust Security with next-gen access solutions reported twice the confidence to accelerate …

London underground
26,000 electronic devices are lost on London Transport in one year

Commuters lost over 26,000 electronic devices on London’s Transport for London (TFL) network last year, new research from the think tank Parliament Street has revealed. The …

Red door
Unrestricted access to systems and files exposes organizations to cybercrime

UK organisations are leaving themselves vulnerable to cybercrime with over a third of 18-24-year-olds able to access any files on their company network, and only one in five …

Dixons Carphone
Dixons Carphone breach: Personal and payment card info compromised

Dixons Carphone, the multinational electrical and telecommunications retailer that holds over 2,000 stores across the UK, Ireland and mainland Europe, has suffered a security …

Centrify extends Zero Trust security ecosystem

Centrify announced it is extending the Zero Trust ecosystem with new partners and a new partner program, the Centrify Zero Trust Security Network. The expanded program, …

user
Zero Trust Security: Never trust, always verify

Zero Trust Security assumes that untrusted actors already exist both inside and outside the network. Trust must therefore be entirely removed from the equation. In this …

social media
Would you delete your account if a social media provider misused your data?

With the Facebook scandal involving Cambridge Analytica still fresh in people’s minds, two-thirds of professionals admit they would delete their account if a social media …

question
Poor communication between CEOs and technical officers leads to misalignment

A misalignment between CEOs and technical officers is weakening enterprise cybersecurity postures, according to Centrify. CEOs are incorrectly focused on malware, creating …

broken
Lack of proper security solutions is annihilating companies’ reputations

Businesses are not meeting consumer expectations around protecting personal information, according to a study conducted by the Ponemon institute across the U.S., U.K., Germany …

bulb
7 tips to reduce risks of data breaches

A recent study conducted by Forrester Consulting found that two-thirds of organizations have been breached five times in the past two years. It’s clear that traditional …

programmer
Bored employees seen as biggest potential data security risk

Employees who become distracted at work are more likely to be the cause of human error and a potential security risk, according to a snapshot poll conducted by Centrify at …

Don't miss

Cybersecurity news