Phone Number +1-202-802-9399 (US)

Thycotic’s Cyber Security Blog

FEATURED STORY:

The New Cyber Security “Perimeter”: Securing Privileged Access

Secure your vulnerable apps, devices, and cloud data through least privilege access

Cloud Tips

Filter by Tags: 

Give Your Cyber Security Career a Boost

August 3rd, 2021

While the shortage of qualified cyber security professionals continues to grow exponentially and ransomware attacks grab international headlines, many mid-career IT professionals with cyber security job experience are evaluating their options. Maybe a year of working remotely has given you pause to think about your career goals and take some time to learn new skills.…


Black Hat USA 2021 – Top 5 Sessions to Attend & Tips to Survive Now that Conferences are Back In-Person

July 29th, 2021

It is that time of the year again—hacker summer camp is back! In 2020, the global pandemic dramatically changed our social environment, and both Black Hat and Defcon went virtual with in-person networking and parties placed on hold. This year, both events are back with a hybrid flavor to them. Black Hat USA, Saturday, July…


Cyber Security Wakeup Call: New Global Research Shows Remote Workers Face Tough Choices Between Productivity and Security

July 27th, 2021

ThycoticCentrify just completed a global cyber security survey among 8,000+ knowledge workers in 15 countries in partnership with Sapio Research. Survey results reveal a disturbing (if not surprising) disconnect between an understanding of cyber security risks in 2021 and the risky activities employees engage in every day to get their jobs done. This new survey…


Day 90 Merger Update: Momentum During Integration Delivers a Great Q2 for ThycoticCentrify

July 22nd, 2021

Last week we passed the 90-day mark as we continue our integration journey as ThycoticCentrify. We also got a detailed look at our company performance during Q2. Across the board, it was clearly a hugely successful quarter for ThycoticCentrify. When you put the Thycotic and Centrify numbers together, it’s even more impressive and a powerful…


Thycotic and Centrify both named Leaders again in the 2021 Gartner Magic Quadrant for Privileged Access Management

July 21st, 2021

We’ve done it again! I’m very proud to share that both Thycotic and Centrify have again been recognized by Gartner as Leaders in the 2021 Gartner Magic Quadrant for Privileged Access Management (PAM). Evaluation by Gartner had already commenced before we announced the intent to combine as ThycoticCentrify in March 2021*. So this will be…


Case Study: High Security Architecture for Healthcare Networks

July 20th, 2021

Cyber attacks against the healthcare industry continue to rise. The recent cautionary tale of the University of Vermont Health Network’s ransomware scare is but one example of how attackers are ramping up to steal data and disrupt services. Hospitals are working to fortify their defenses to keep one step ahead of the bad guys. Even…


Privilege Elevation for Workstations and Servers

July 13th, 2021

“Start with the end in mind.” That’s how people tell you to face a challenge. While that’s true, the end can sometimes look so far away you feel overwhelmed before you even begin. When that happens, the best thing to do is set small, attainable goals along the way. You can use the same strategy…


How to Vacation Safely, Without Increasing Your Cyber Security Risk

July 6th, 2021

The combination of pandemic lockdowns and remote work has led to a stockpile of unspent PTO. With vaccination rates increasing and travel restrictions lifting, people are starting to use their vacation days in droves. But that doesn’t mean hackers -- or their bots -- are taking time off.  (Side note: Criminal hackers really should take time off. They’ve been working…


3 Top Takeaways from the 2021 Verizon Data Breach Investigations Report

June 29th, 2021

The 2021 Verizon Data Breach Investigations Report (DBIR) is here with the latest news and trends on the past year’s data breaches and security incidents. The Verizon DBIR is one of the industry’s top reports providing us with an indication of how well, or how poorly, our security efforts are performing, as well as giving…


Layered Privilege Security with Secret Server and Privilege Manager

June 22nd, 2021

Nearly all major data breaches involve both compromised endpoints and compromised privileged credentials. You must address both of these attack vectors in a layered security strategy to effectively lower your risk of a cyber attack. Layered security combines different security solutions into a coordinated, comprehensive strategy, the whole of which is greater than the sum…