Phone Number +1-202-802-9399 (US)

Thycotic’s Cyber Security Blog

FEATURED STORY:

A Guide to Managing and Securing Privileged Users

Gain a practical understanding of different types of users with a focus on privileged users and privileged user management

Privileged Users Blog Post

Filter by Tags: 

An Ethical Hacker’s Guide to IoT Security Risks and Challenges: Part 1

November 30th, 2021

Welcome to the world of IoT (Internet of Things). More devices get connected online every minute, with more than 9-billion devices performing all sorts of tasks and automation. Every day, employees power up their devices and connect to the internet. They check the news, receive and respond to emails, chat with colleagues, pay invoices, work,…


Back to Basics: Service Account Management 101

November 23rd, 2021

Service accounts don’t have to be a nightmare. Get them under control now. Service accounts are typically used in operating systems to execute applications or run programs, either in the context of system accounts (high privileged accounts without any password) or a specific user account, usually created manually or during software installation.  On Unix and…


Securing Secrets is Key to DevOps Innovation says New Forrester Survey Report

November 16th, 2021

A new survey and report from Forrester commissioned by ThycoticCentrify highlights what IT security and business leaders consider their biggest DevOps security challenges and what they want to see in solutions that will effectively resolve them. Solutions to what Forrester calls the DevOps “security innovation paradox” are critical for organizations, because sacrificing security in the…


PAM Pricing: The Real Cost of PAM Software

November 9th, 2021

A low price tag for PAM software doesn’t necessarily mean it’s the best overall value. Enterprise-scale PAM, like most software purchases, typically involves more than the initial license fee. Depending on your security goals, internal resources, and specific IT environment, you may need to plan for additional costs. It’s important to identify the total cost…


Cloud Security Best Practices Checklist

November 2nd, 2021

Transitioning to the cloud is one of the most significant technology shifts your company will face. Over 80% of organizations operating in the cloud have experienced at least one compromised account each month, stemming from external actors, malicious insiders, or unintentional mistakes. The specifics of cloud security activities may vary depending on your cloud platforms…


Smarter, More Modern PAM: Secret Server Integration with the Platform Plus Cloud Suite Enhancements

October 27th, 2021

ThycoticCentrify’s latest release evolves our Privileged Access Management (PAM) solutions along two critical strategic paths. Firstly, we’re blending Thycotic and Centrify PAM products, so you benefit from the very best PAM capabilities from two of the industry’s market leaders. As an example, existing Secret Server customers will now be able to take advantage of flagship…


Ransomware Mitigation: Where Do We Go From Here?

October 19th, 2021

Following recent headlines surrounding cyber security, it’s reasonable to conclude that ransomware has rapidly become one of the biggest global threats our businesses and institutions face today. These attacks—which infiltrate our networks, lock up critical data, and demand a substantial ransom in cryptocurrency to restore vital information—have reached crisis proportions, especially in areas like healthcare and…


The Password Spreadsheet: Why NOT to store your passwords in Excel

October 14th, 2021

Is your organization still using an Excel password spreadsheet to store and manage sensitive passwords—the keys to your kingdom? You’re not alone. But storing privileged account passwords and credentials in an Excel spreadsheet poses a serious security risk. Excel was never intended to be a password manager, so there’s no chance it’s ever going to…


Limit Privileged Access for Third-Party Vendors Without Restricting their Ability to Get Work Done

October 12th, 2021

Companies often work with outside experts, consultants, and other third-party vendors who need privileged access to corporate resources. You may be engaging with third-party vendors in a number of different ways, such as a remote contractor working on a time-limited project, an embedded contractor, or outsourced staff augmentation. These third-party entities can’t do what they…


Privileged Password Management 101: What exactly is PPM?

October 5th, 2021

Let’s reduce password pain and move passwords into the background Passwords remain one of the top challenges and causes of cyber fatigue for employees. As we move more of our business and lives online this means the number of credentials needed to protect our identities continues to grow. Unfortunately, a single password is sometimes the…