Top 3 PAM Features that Set Centrify Zero Trust Privilege Apart for Cloud Migrations
Ask any sales person what the most common question they get from prospects is, and the answer will typically be the same: “What makes your company different?” Or maybe, “What makes you better than your competitors?”
And while the response from sales people should be the same, it’s amazing how different the answers can be. Those who are on their...
Recent Cloud Atlas activity
Also known as Inception, Cloud Atlas is an actor that has a long history of cyber-espionage operations targeting industries and governmental entities. We first reported Cloud Atlas in 2014 and we’ve been following its activities ever since.
From the beginning of 2019 until July, we have been able to identify different spear-phishing campaigns related to this threat actor mostly focused...
Clear Message Sent: Don’t Roll the Dice on Data Privacy Compliance
Last month, two leading companies each received what were then record-setting fines for data breach violations: £183 million for British Airways and then, just two weeks later, $5 billion for Facebook. Regulators sent a clear message to organizations around the world — if you don’t treat your customers’ data with the greatest care, you should expect severe punishment when...
SCM for Dummies eBook
SCM for Dummies eBook #outlook a{ padding:0; } body{ width:100% !important; } .ReadMsgBody{ width:100%; } .ExternalClass{ width:100%; } body{ -webkit-text-size-adjust:none; } body{ margin:0; padding:0; } img{ border:0; height:auto; line-height:100%; outline:none; text-decoration:none; } table td{ border-collapse:collapse; } #backgroundTable{ height:100% !important; margin:0; padding:0; width:100% !important; } body,#backgroundTable{ background-color:#ffffff; }...
Centrify Mid-Year Data Breach Report: Credential Abuse One of the Top Threats of Cyber Attacks in First Half of 2019
It’s hard to believe that we’re already more than halfway through 2019. Or as I like to put it, I’ve already wasted one month of summer without getting outside enough.
Well, one of the reasons why is because here at Centrify we’ve been laser focused on stopping the leading cause of data breaches – privileged access abuse.
We recently looked back...
DDoS attacks in Q2 2019
News overview
The second quarter of 2019 turned out to be richer than the first in terms of high-profile DDoS attacks. True, most of the campaigns that attracted media attention appeared to be politically, rather than commercially, motivated — and that despite the fact that some security experts discern a clear fall in hacktivism in recent years.
Let’s begin with an...
From E-Commerce to Enterprise Employee: How I Overcame my Fears and Doubts
By Efrat Silberhaft
One year ago, I was working as the sole designer in a small e-commerce startup. When the company shut down, I had to start looking for a new job. I decided to leave the startup world. What I didn’t know is that my next step would turn out to be in a different field — cybersecurity —...
Stronger Together, Red Hat 3scale Integration
Most enterprises today rely on customers accessing their applications to conduct daily business. These enterprises know by now that application programming interfaces (APIs) are becoming more common than ever before to enable communication between applications and end users. Even though they are working behind the scenes, APIs are ubiquitous – they help to deliver sports updates, post online messages,...
APT trends report Q2 2019
For two years, the Global Research and Analysis Team (GReAT) at Kaspersky has been publishing quarterly summaries of advanced persistent threat (APT) activity. The summaries are based on our threat intelligence research and provide a representative snapshot of what we have published and discussed in greater detail in our private APT reports. They aim to highlight the significant events...