Chris Carroll

Chris Carroll is a freelance technology writer with over 30 years editorial experience. He has written thought leadership whitepapers, magazine articles, customer stories, and marketing materials for industry leaders including IBM, Motorola, HP and Oracle as well as for innovative, early stage startups.

How Much MFA is Too Much MFA?
BrandPost Centrify

How Much MFA is Too Much MFA?


5 Steps to Securing Privileged Access for Outsourced IT

5 Steps to Securing Privileged Access for Outsourced IT

Misuse of privilege access is a major security threat – but the solution is close at hand.

PCI DSS 3.2: Is It Enough to Protect Cardholder Data?

PCI DSS 3.2: Is It Enough to Protect Cardholder Data?

The short answer is yes—but forward-thinking organizations will take the time to double check.

5 Best Practices for Guarding Against Insider Threats

5 Best Practices for Guarding Against Insider Threats

As the user base continues expanding, securing enterprise resources against insider threats has emerged as a front-burner issue. But there’s good news: Organizations can guard against insider threats by implementing the following...

My Big Data Commercial Applications Are Secure, Right?

My Big Data Commercial Applications Are Secure, Right?

If you must ask, the answer is probably “no”

Leveraging Privileged Identity Management to Support PCI Compliance

Leveraging Privileged Identity Management to Support PCI Compliance

Managing administrative privileges over credit card information is essential

Is There any Risk Associated with Outsourcing IT?

Is There any Risk Associated with Outsourcing IT?

Minimize identity-related risks for third-party partners with federated authentication

Identifying Your Company’s Edward Snowden

Identifying Your Company’s Edward Snowden

Implement a scalable model for managing the lifecycle of your insider’s identities

How to Prevent CEO Fraud

How to Prevent CEO Fraud

Implement Best Practices to Avoid This Growing Type of Scam

How Has Mobile Changed Multi-factor Authentication?

How Has Mobile Changed Multi-factor Authentication?

With the growth in mobile comes the need for tighter security

Load More