Phone Number +1-202-802-9399 (US)

Thycotic’s Cyber Security Blog

FEATURED STORY:

A Guide to Managing and Securing Privileged Users

Gain a practical understanding of different types of users with a focus on privileged users and privileged user management

Privileged Users Blog Post

Filter by Tags: 

Privilege Manager Offers Increased Flexibility and Enterprise-Wide Security

September 21st, 2021

No enterprise is alike in the way they organize privileged users or choose to connect IT systems.  The latest release of Privilege Manager provides greater flexibility and choice by supporting diverse models for computer management and identity federation. For organizations that manage a variety of privileged users, business units, and connected technologies, Privilege Manager now…


Zero Trust for ICS/SCADA Systems

September 14th, 2021

Society today is heavily dependent on critical infrastructure that mostly works behind the scenes such as power stations, oil refineries, agriculture operations, mining, water treatment, green energy, transportation, and manufacturing operations. These systems help deliver electricity to power our homes, recharge our phones and vehicles, deliver goods using just-in-time (JIT) manufacturing processes or simply provide…


What Small Businesses Need to Know About Cyber Security and Password Management

September 7th, 2021

Small to medium businesses (SMBs) made tough choices this past year to keep their business running. Staff scattered to work from home—unexpectedly—and SMBs had to quickly enable them with tools and support to stay connected. Many small companies were forced to sacrifice cyber security best practices in favor of business productivity, increasing their risk of…


Thycotic and Centrify Recognized Again as Leaders in New 2021 KuppingerCole Leadership Compass for PAM

September 1st, 2021

As we announced our merger in March and began our integration, Thycotic and Centrify were in the process of being evaluated separately by KuppingerCole for its 2021 Leadership Compass for Privileged Access Management (PAM). Not surprisingly, both Thycotic and Centrify were named Overall Leaders again, as well as earning leadership positions in the major categories…


Approval Workflows and Notifications for Busy People

August 31st, 2021

Maybe it's happened to you. You deleted a service account because it didn’t seem like any processes were tied to it. And then something broke. Privilege management mistakes happen—but they don’t have to. Setting up an end-to-end workflow for privileged account governance decreases the risk of mistakenly pulling the plug on an important process. The…


Certificate-Based Authentication and TTL for All Cloud Platforms

August 24th, 2021

DevOps is a world of machines. To access systems and data, secrets are exchanged between all types of machines, including databases and applications for software and infrastructure deployment, testing, orchestration, configuration, and Robotic Process Automation (RPA).    The speed and scale of DevOps requires secrets to be created instantly, tracked incessantly, and eliminated when no longer…


Six Questions Secret Server Answers in the Latest Updates

August 17th, 2021

You asked and we answered. We’ve been listening to questions Secret Server customers ask and working hard to make the industry’s top PAM solution even better. We’re excited to share a batch of updates to Secret Server that address your top concerns. 1. Is it possible to get rid of secrets and related data after…


Zero Trust Privilege for PAM Dummies eBook

August 10th, 2021

Security is Broken. Long Live Security. At ThycoticCentrify, cyber security is our bag. We’ve blogged about how identity-based breaches are on the rise, fueled by a perfect storm of conditions that include cloud transformation, an expanding attack surface, and wholesale remote VPN-based access due to the increase in work from home. Businesses worldwide are deploying…


Give Your Cyber Security Career a Boost

August 3rd, 2021

While the shortage of qualified cyber security professionals continues to grow exponentially and ransomware attacks grab international headlines, many mid-career IT professionals with cyber security job experience are evaluating their options. Maybe a year of working remotely has given you pause to think about your career goals and take some time to learn new skills.…


Black Hat USA 2021 – Top 5 Sessions to Attend & Tips to Survive Now that Conferences are Back In-Person

July 29th, 2021

It is that time of the year again—hacker summer camp is back! In 2020, the global pandemic dramatically changed our social environment, and both Black Hat and Defcon went virtual with in-person networking and parties placed on hold. This year, both events are back with a hybrid flavor to them. Black Hat USA, Saturday, July…