Privileged Access Management In The Modern Threatscape
Privileged access remains the preferred vector for attackers, and most organizations aren’t taking the very basic steps to secure it
Best Practices For Privileged Identity Management In The Modern Enterprise
In this paper, they explore the modern enterprise — a hybrid organization with infrastructure spread across on-premises data centers as well as hosted in the cloud and one where IT functions are split between internal and 3rd-party administrators. (more available)
Who Moved My Secure Perimeter
In today’s mixed on-premises and cloud IT environment, securing one network perimeter is not enough. This paper examines six common risks of this “perimeterless” world, and proposes six opportunities to strengthen security using Identity-as-a-Service. (more available)
Top Six Things To Consider With An Identity As A Service Solution For Zero Trust Security
As we look to redefine security where every access is authenticated and authorized, selecting the right IDaaS vendor becomes a critical decision to make. (more available)
Six Best Practices For Securing Amazon Web Service
This paper offers some solutions to the best practices for securing Amazon Web Services.
Security Privacy And The Next Generation Workforce
Based on this research on the growing age gaps in the workforce, Centrify has been able to identify some key recommendations that senior decision makers can follow to help bridge the gap and harmonise approaches to data security and privacy in the workplace. (more available)
Secure The Vote With Zero Trust Security
This report focusses on the election of 2016 and offers some solutions for protecting an election from hackers.
Equifax: A Cautionary Tale
Rather than dismiss the Equifax incident as something that “could never happen to us,” know that it absolutely could. The only way to avoid a devastating breach is through a meticulous prevention strategy and a strong security posture. (more available)