Story image

'It's time to rethink security' warns Centrify exec

22 Aug 2016

A total of 63% of confirmed data breaches involve weak, default or stolen passwords, says Verizon.

David McNeely, vice president of Product Strategy for Centrify, warns that it's time to rethink security.

McNeely says businesses are increasingly recognising that passwords are broken and users have too much access and privilege.

“Staying with the status quo is not viable because password-based security solutions are not protecting us,” he says.

“For organisations to reduce the risks created by hybrid IT infrastructures, they need to move from a position of having too many passwords and too much privilege for users to a situation where all privileged access is logged and monitored as a standard procedure.”

According to McNeely, essential steps in this migration include reducing silos, so that users only need to remember their network identity. Another way would be to kill off passwords by demanding Single Sign On (SSO) from vendors and developers.

“SSO enables centralised Multi-Factor Authentication (MFA) and adaptive access control to eliminate problems caused by self-managed passwords,” explains McNeely.

“A vital step in this process is to enforce least privilege access for your systems.”

He adds that organisations can reduce risk by replacing shared service accounts with the ability for an authorised employee to login with MFA to temporarily elevate their privilege.

“Centrify’s vision is to provide secure access to apps and infrastructure for all users from any device. To achieve this goal and survive in a hybrid IT world, organisations need to rethink how they do security.”

Machine learning is a tool and the bad guys are using it
KPMG NZ’s CIO and ESET’s CTO spoke at a recent cybersecurity conference about how machine learning and data analytics are not to be feared, but used.
Seagate: Data trends, opportunities, and challenges at the edge
The development of edge technology and the rise of big data have brought many opportunities for data infrastructure companies to the fore.
Popular Android apps track users and violate Google's policies
Google has reportedly taken action against some of the violators.
How blockchain could help stop video piracy in its tracks
An Australian video tech firm has successfully tested a blockchain trial that could end up being a welcome relief for video creators and the fight against video piracy.
IBM X-Force Red & Qualys introduce automated patching
IBM X-Force Red and Qualys are declaring a war on unpatched systems, and they believe automation is the answer.
Micro Focus acquires Interset to improve predictive analytics
Interset utilises user and entity behavioural analytics (UEBA) and machine learning to give security professionals what they need to execute threat detection analysis.
Raising the stakes: McAfee’s predictions for cybersecurity
Security teams and solutions will have to contend with synergistic threats, increasingly backed by artificial intelligence to avoid detection.
Exclusive: Ping Identity on security risk mitigation
“Effective security controls are measured and defined by the direct mitigation of inherent and residual risk.”