Centrify Booth 2410: Your Destination for All Things Zero Trust Security at BlackHat USA
BlackHat USA 2018 kicks off in Las Vegas next week, the 21st year that the information security event has brought together thousands of cybersecurity...
A mining multitool
Recently, an interesting miner implementation appeared on Kaspersky Lab’s radar. The malware, which we dubbed PowerGhost, is capable of stealthily establishing itself in a...
Gartner and Centrify Agree – PAM is #1 Security Project for 2018
CISOs are overwhelmed with a multitude of projects that are pulling at their time and resources. All of these projects feel important and usually...
A study of car sharing apps
The growing popularity of car sharing services has led some experts to predict an end to private car ownership in big cities. The statistics...
Adopt Next-Gen Access to Power Your Zero Trust Strategy
Security breaches are now all too commonplace — 58% of organizations have experienced at least one in the past 12 months. As a result,...
Calisto Trojan for macOS
An interesting aspect of studying a particular piece of malware is tracing its evolution and observing how the creators gradually add new monetization or...
The Cost of Customer Identity & Access Management (CIAM)
Customer Identity and Access Management (CIAM) is essentially a set of tools that allow your business to securely authenticate, manage and engage customers who...
The return of Fantomas, or how we deciphered Cryakl
In early February this year, Belgian police seized the C&C servers of the infamous Cryakl cryptor. Soon afterwards, they handed over the private keys...














