NIST 800-63 For Unix/Linux Servers: Centrify vs. Password Vault Only Solutions
When it comes to controlling logins and privileges on Unix/Linux servers, Centrify’s philosophy is aligned with modern NIST recommendations, as opposed to traditional vendors whose solutions are centered around a Password Vault. Centrify believes users should login directly as themselves and elevate privileges granularly as needed and authorized.
The Password is Dead – 6 Best Practices for Multi-Factor Authentication
Compromised credentials are a leading cause of security breaches. According to Verizon’s 2015 Data Breach Investigations Report, 95% of security incidents involved stealing credentials from customer devices, and using them to web applications. So many stolen credentials are available to hackers, generally on the Dark Web, that passwords are no longer effective.
Securing the Cyber Frontlines with the Right Workforce and Collaboration
Last month's ICIT Winter Summit hosted a packed house of cybersecurity thought leaders from the industry and the public sector. The summit convened with an opening keynote on Securing the Cyber Frontline from Brigadier General (Ret.) Greg Touhill, former Federal CISO.
A Security Wish List for the New Administration Starts with Multi-Factor Authentication
Late last year, the government’s Commission on Enhancing National Cybersecurity published a detailed report, at President Obama’s request, to provide short- and long-term recommendations to strengthen cybersecurity in the public and private sector (you can read the full report on the NIST website).