• #michael
  • Feb 19, 2020
  • By QOMPLX

Data-Centric Cybersecurity Starts with Authentication

Data-Centric Cybersecurity Starts with Authentication

With the RSA Conference almost upon us, you're likely to hear a lot in the coming days and weeks about the need for "data-centric" cyber security. It's an intriguing phrase, but what does it mean, practically?

The Forbes Technology Council, an invitation-only organization that is made up of senior-level technology executives, recently put this question to its members, including QOMPLX Chief Executive Officer Jason Crabtree. The result is a list of 12 useful tips for shifting your own approach to "data centric" cyber security.

In his response, Jason talks about the critical importance of authentication as a foundational security control. "Everything else depends on it," Crabtree writes. "The concept of data-centric security is all about ensuring rigorous enforcement of identity and then addressing authorized levels of access for authenticated users."

To start, businesses should address their authentication tools, such as single sign-on and multi-factor authentication. They should also closely monitor core identity infrastructure like Kerberos, Crabtree advised.

Read Jason Crabtree’s contribution to this Forbes Technology Council article: “12 Tips to Help Shift Your Business to Data-Centric Cybersecurity

You might also be interested in

Subsidiaries Bring Growth And Risk that Must be Managed

Subsidiaries Bring Growth And Risk that Must be Managed

Businesses must be resilient to potential risks introduced by subsidiaries. M&A activity requires cyber due diligence be at the forefront for an acquiring company.

Read more
SIGRed Windows DNS Vulnerability Hands Domain Privileges to Attackers

SIGRed Windows DNS Vulnerability Hands Domain Privileges to Attackers

CVE-2020-1350, a wormable Windows DNS server vulnerability, threatens Active Directory domain controllers and network resources.

Read more
Hardening Active Directory Blunts Ransomware Extortion Attacks

Hardening Active Directory Blunts Ransomware Extortion Attacks

Recent attacks against firms like NTT highlight why businesses must address critical authentication infrastructure and reduce privileged access to stem potential disruption from ransomware.

Read more
Request a Demo

Interested in learning more?

Subscribe today to stay informed and get regular updates from QOMPLX.