Back to Search Begin New Search Save Search Auto-Notify
5 Myths of Privileged Access Management...
IT professionals engaged in cloud migration projects are legitimately concerned about security. Their organizations may have deployed a Privileged Access Management (PAM) solution to secure on-premises infrastructure yet worry remains whether legacy PAM can adapt to secure the entire hybrid enterprise. But with information overload it is hard to tell fact from fiction. To help uncover the facts, we’re hosting a webinar on August 29th whe...
August 29, 2019
Organizer: Centrify
Location: Webcast
Add Favorite
5 Steps to Minimize Your Exposure to Ra...
Ransomware attacks are dominating the headlines in 2019: City of Baltimore, ASCO Industries, and the Weather Channel are just a few of the examples. Holding someone or something for ransom is a simple yet effective criminal strategy used for thousands of years. Today, cybercriminals are applying these ancient techniques to modern technologies. And according to the FBI’s Internet Crime Complaint Center, the damages associated with ransomw...
July 25, 2019
Organizer: Centrify
Location: Webcast
Add Favorite
The Anatomy of a Hack: Perception vs. R...
The anatomy of a hack has been glorified, leading to the common belief that data breaches require a tremendous amount of sophistication. However, post-mortem analysis has repeatedly found that the source of a hack is often due simply to compromised credentials. And it’s not just anecdotes. According to a recent study by Centrify, 74 percent of respondents acknowledge they were breached via access to a privileged account. Forrester agrees...
June 6, 2019
Organizer: Centrify
Location: Webcast
Add Favorite
Back to Search Begin New Search