On Systems, Smoke Alerts, and Lessons Learned from The Paris Notre-Dame Cathedral Fire
There is a great exposé in the New York Times breaking down the timeline and mis-steps in response to the fire that occurred in...
GUEST BLOG: A Gen Z’s Perspective on Cybersecurity
I had the pleasure to mentor a summer intern named Min Ji Kim, who is returning to NYU to continue her education next week....
Agent 1433: remote attack on Microsoft SQL Server
All over the world companies large and small use Microsoft SQL Server for database management. Highly popular yet insufficiently protected, this DBMS is a...
IT threat evolution Q2 2019
Targeted attacks and malware campaigns
More about ShadowHammer
In March, we published the results of our investigation into a sophisticated supply-chain attack involving the ASUS Live...
Top 3 PAM Features that Set Centrify Zero Trust Privilege Apart for Cloud Migrations
Ask any sales person what the most common question they get from prospects is, and the answer will typically be the same: “What makes...
Recent Cloud Atlas activity
Also known as Inception, Cloud Atlas is an actor that has a long history of cyber-espionage operations targeting industries and governmental entities. We first...
Centrify Mid-Year Data Breach Report: Credential Abuse One of the Top Threats of Cyber...
It’s hard to believe that we’re already more than halfway through 2019. Or as I like to put it, I’ve already wasted one month...












