Phone Number +1-202-802-9399 (US)

Thycotic’s Cyber Security Blog

FEATURED STORY:

The New Cyber Security “Perimeter”: Securing Privileged Access

Secure your vulnerable apps, devices, and cloud data through least privilege access

Cloud Tips

Filter by Tags: 

30-Day Update on ThycoticCentrify Integration and Major Accomplishments

May 17th, 2021

It’s amazing to think that it’s only been 30 days since the announcement of the intended merger of Centrify and Thycotic. We are excited to share that we officially started the process of integrating these two privileged access management (PAM) leaders, and have already accomplished a lot in this short period of time. We remain…


Cloud Discovery: Find and Keep Track of Cloud Privileged Accounts

May 11th, 2021

One of the main advantages of using a cloud platform like AWS is that you don’t need to worry about maintenance and upgrades. Yet, cloud partnerships don’t absolve you of protecting sensitive information and processes. When you consider that Forrester Research found that 93% of enterprises are storing sensitive data in the cloud, you can…


Cyber Security Incident Reporting Process and Template

May 6th, 2021

Ever since we launched our customizable cyber security incident report template, I’ve been amazed by its volume of downloads. I quickly realized that the increasing cyber threats from criminal hackers, malware, and ransomware being taken seriously by organizations large and small, and that there is a growing demand for guidance and information on cyber security…


Privileged Access Management Analytics: Make Your Data Work for You

May 4th, 2021

When time is a resource you don’t have — you must make your data work for you. IT teams face an ever-evolving and expanding environment compounded by a shifting remote workforce, increase in BYOD policies, expansion of the attack surface, and pivot towards the cloud. Users and endpoints have left the office and are now…


Key Takeaways from the 2021 Cyberthreat Defense Report

April 27th, 2021

The recently released Cyberthreat Defense Report (CDR) 2021 from CyberEdge Group is packed with information about the rapidly evolving cyber security universe in the wake of a global pandemic.  Now in its eighth year, the 2021 CDR assessed the views of 1,200 IT security professionals representing 17 countries and 19 industries. It is one of…


The New Cyber Security “Perimeter”: Securing Privileged Access

April 22nd, 2021

Because so many applications and services are now hosted in the cloud, the traditional cyber security perimeter no longer exists. Accelerated by the COVID global pandemic, remote access from multiple devices has become the rule rather than the exception across our networks. In our always-on, Internet-connected universe, every user potentially has access to privileged or…


Adoption Skyrockets with Invisible Privileged Access Management

April 20th, 2021

Traditional PAM solutions require users to interrupt their workflow to access privileged credentials. They must switch screens and switch contexts, slowing their productivity. Frustrated, busy users are more likely to skirt security policies when PAM is difficult to use. Privileged access management must be embedded in daily workflow To realize the benefits of enterprise PAM,…


Stronger Secrets Management in the Latest Version of Secret Server

April 15th, 2021

Secrets management requires broader and deeper security controls than traditional enterprise PAM. The latest release of Thycotic Secret Server provides stronger secrets management than ever before. Usability, workflow, and reporting enhancements to Secret Server save you time and strengthen your attack surface. Remove roadblocks in the approval workflow  Secret Server’s approval workflows increase visibility and…


Introducing ThycoticCentrify: Integrating Two Identity Security Leaders

April 13th, 2021

By Art Gilliland and Jim Legg Today, we are pleased to share that Centrify and Thycotic have merged to become one. This follows on the previously-announced acquisitions of Centrify and Thycotic by TPG Capital. We are now able to embark on the process of integrating our businesses and solutions to better serve our customers and…


Beazley Improves Security Compliance and Saves Time on Audits

April 6th, 2021

Specialist insurer Beazley has exponentially more secrets than employees. The volume and variety of their privileged accounts made them difficult to manage and time-consuming to audit. An external security audit identified gaps in Beazley’s secrets management processes that opened the door to potential privileged account attacks. “The audit discovered privileged account passwords that hadn’t been…