Phone Number +1-202-802-9399 (US)

Thycotic is now Delinea!

Thycotic’s Cyber Security Blog


We’ve Moved

Thycotic and Centrify are now Delinea. Visit our new blog at for the latest content.

We've Moved

Filter by Tags: 

Findings from Delinea’s 2022 cyber insurance research report paint a troubling picture

November 10th, 2022

There were many findings in our recent research report on cyber security that weren’t a surprise. The survey confirmed what you’d expect: demand is high for cyber insurance policies and cyber insurance costs are rising. But other findings in the report caught me by surprise.

Reduce cloud development pipeline risk with CIEM in these 3 steps

October 27th, 2022

Protect your organization’s software development pipeline or risk catastrophic consequences. By accessing the software development pipeline, malicious actors could steal valuable IP, slow production, or even insert malware that could be shipped with the product.

Secret Server releases updates to increase resiliency and security

October 25th, 2022

We all know that cybersecurity is more important than ever. Let’s go over the facts: data breaches are getting worse every year cybercriminals are becoming more sophisticated breaches are costing companies millions of dollars attack surfaces are expanding organizations have more identities to manage than ever before company leaders are in the hot seat, which…

Cloud Server Privilege Management for Dummies eBook

October 11th, 2022

Servers are the ultimate target for cyberattackers, with attacks and security risks increasing as organizations scale and migrate more workloads to the cloud. Enterprises are continuously challenged with server access vulnerabilities, ransomware, supply-chain attacks, and securing remote access in the hybrid cloud security landscape. Adding to these challenges, most organizations are understaffed on security and…

Protect Active Directory from cyberattacks with Server PAM

October 4th, 2022

A cyberattacker just breached your Microsoft Azure Active Directory. Is it game over? Not if you have the right privileged access controls in place. Microsoft Azure Active Directory (AD) is a high-value target for cybercriminals to attain their nefarious goals. Many organizations still rely on on-premise AD, but the adoption of Microsoft’s cloud-based Azure AD…

Robert Weed slashes time spent on PAM by 90% by transitioning to Secret Server

September 27th, 2022

Imagine walking into your new job as a CISO or head of IT operations. Your first order of business is to understand the risks your company faces. You’ve got to figure out which systems are critical, which security solutions are already in place, and where the gaps are. And you’ve got to do it fast. 

How to Create an IT Disaster Recovery Plan: The Ultimate Guide

September 20th, 2022

Many organizations today are highly vulnerable to downtime since they lack optimized and reliable disaster recovery plans. In fact, Gartner reports that 72% of organizations are not well-positioned for disaster recovery. Without a robust IT disaster recovery plan in place, businesses risk significant and prolonged operational failure, data loss, and revenue loss.

Extended PAM (XPM): Intelligent automation for risk-based, adaptive privilege

September 15th, 2022

Why privileged access management must be extended In my previous blog, Extended PAM for integrated, multi-layered cyber defenses, I explored the reasons why we at Delinea believe that Privilege is the future of cybersecurity. Over the course of my career in cybersecurity, I’ve seen the rise of many promising solutions, but at the end of…

An introduction to DevOps secrets management and vaulting

September 13th, 2022

If your DevOps team hardcodes secrets into applications, they inadvertently put your business at significant risk of cyberattacks. DevOps implementation by businesses is no longer a novel strategy, yet security remains a serious issue. In 2021, 83% of IT decision-makers reported in a survey that their companies are using DevOps to meet the needs of their businesses, leading…

Conversational Geek teaches you cyber insurance 101

September 6th, 2022

If your business gets hit by a serious cyberattack, is it game over? Thanks to cyber insurance, this doesn’t have to be the case. Cyber insurance, like auto or home insurance, reimburses the policyholder for losses incurred from a cyberattack. Sounds great, right? Well, the issue facing businesses looking to get cyber insurance is that…