Phone Number +1-202-802-9399 (US)

Thycotic is now Delinea!

Thycotic’s Cyber Security Blog


We’ve Moved

Thycotic and Centrify are now Delinea. Visit our new blog at for the latest content.

We've Moved

Filter by Tags: 

CISO Q&A with Delinea’s Stan Black

August 30th, 2022

As part of our interview series with Delinea’s leaders, we sat down with Stan Black, Chief Information Security Officer. Before joining Delinea, Stan was Chief Security and Intelligence Officer at Lattice Security, SVP, Chief Security Officer, and Chief Information Officer at Citrix. Prior to Citrix. Stan was Chief Security Officer at Nuance. He was also…

How Just-in-Time privilege elevation prevents data breaches and lateral movement

August 23rd, 2022

In the weeks that followed the high-profile attack on the SolarWinds supply chain, it became clear that the threat actors infiltrated the company’s internal networks and cloud infrastructure through unrestricted privileged access. Once inside the network, they were able to move laterally in the system. This attack and many others reinforce the importance of an…

Ethical Hacker Tips for Securing the Cloud

August 16th, 2022

Is the cloud safer than traditional on-premise computing environments? Can the cloud be hacked? Is it safer to use the cloud as storage for all things digital? These questions are asked all the time by people inside IT and out.

Global Benchmark Report: Companies Have a Long Way to Go to Protect Privileged Identities and Access

August 9th, 2022

Privileged Identities remain the most sought-after attack vector for cybercriminals. Threat actors are increasingly searching for weak entry points they can exploit to access private systems and applications. Unfortunately, many businesses lack the proper identity verification mechanisms and strategies needed to thwart incoming attacks—making them highly vulnerable to cyber threats.

Privilege Escalation on Linux: When it’s good and when it’s a disaster (with examples)

August 4th, 2022

For authorized users on Linux, privilege escalation allows elevated access to complete a specific task or make system configuration modifications. For example, system administrators may need access to troubleshoot a technical problem, add a user, make configuration changes to an application, or install a program.

Extended PAM for integrated, multi-layered cyber defenses

July 28th, 2022

Increasing IT complexity and an endless array of IAM and cybersecurity tools make it challenging to combat privileged account attacks effectively. As a PAM industry leader, Delinea is creating a future in which you can understand, manage, and defend your entire privileged attack surface from a single solution across both traditional and emerging use cases.…

Delinea Named a Leader Again in the 2022 Gartner® Magic Quadrant™ for Privileged Access Management

July 22nd, 2022

I’m very proud to share that Delinea has been named a Leader in the 2022 Gartner Magic Quadrant for Privileged Access Management (PAM). Download the Report:

Privileged Account Security Simplified | Free eBook

July 19th, 2022

The classic cybersecurity perimeter no longer exists. Today’s cybersecurity is a race against cybercriminals and their expanding networks that have become big business. Ransomware, malware, exploits, and social engineering techniques are constantly evolving, and damages to cybercrime victims are drastically increasing.

Securing Active Directory to Reduce Ransomware Attacks: A Quick Primer

July 12th, 2022

Ransomware attacks are increasing in size and complexity, putting organizations across all industries at risk for account lockouts, extortion attempts, and data loss. In fact, the latest research indicates ransomware attacks are up by 80% year-over-year. In large part, this is because most ransomware families—the code signatures and malicious commands that carry out ransomware attacks—are now…

Passwordless authentication: making the vision a reality

July 5th, 2022

The concept of passwordless authentication has been getting a lot of hype. And for good reason. The human element accounts for most data breaches, with 82% stemming from stolen passwords, phishing, misuse, and errors. The idea that users wouldn’t need to create and remember complex passwords, store them in a password vault, or regularly change…