New Imperva Java SDK: Greasing The Wheels for Active Directory Coding Projects
According to StackOverflow’s 2018 Developer Survey, Java remains one of the world’s most popular coding languages, universally liked for its versatility and ease of...
Phishing for knowledge
When we talk about phishing, top of mind are fake banking sites, payment systems, as well as mail and other globally popular services. However,...
Protecting Industrial Operations With Shop-Floor to Top-Floor Visibility
Protecting Industrial Operations With Shop-Floor to Top-Floor Visibility #outlook a{ padding:0; }...
Centrify’s new spinout, Idaptive, named Overall Leader in KuppingerCole Leadership Compass for Cloud-based MFA...
Wow! Right out of the gate and the brand new spinout of Centrify Application and Endpoint Services as Idaptive is named as an Overall...
At SecurIT in New York, it’s a Zero Trust State of Mind
On October 29-30, Centrify will proudly sponsor the second SecurIT: the Zero Trust Summit for CIOs and CISOs in New York City. Produced by...
44% of Security Professionals Spend More than 20 Hours a Week Responding to Alerts
As the global cybersecurity climate continues to heat up, so too do the subsequent levels of alert fatigue IT security professionals have to deal...
Survey: 44% of Security Professionals Spend More than 20 Hours a Week Responding to...
As the global cybersecurity climate continues to heat up, so too do the subsequent levels of alert fatigue IT security professionals have to deal...
Defense in Depth: 4 Essential Layers of ICS Security
Defense in Depth: 4 Essential Layers of ICS Security #outlook a{ padding:0;...









