Phone Number +1-202-802-9399 (US)

Thycotic’s Cyber Security Blog

FEATURED STORY:

The New Cyber Security “Perimeter”: Securing Privileged Access

Secure your vulnerable apps, devices, and cloud data through least privilege access

Cloud Tips

Filter by Tags: 

Day 90 Merger Update: Momentum During Integration Delivers a Great Q2 for ThycoticCentrify

July 22nd, 2021

Last week we passed the 90-day mark as we continue our integration journey as ThycoticCentrify. We also got a detailed look at our company performance during Q2. Across the board, it was clearly a hugely successful quarter for ThycoticCentrify. When you put the Thycotic and Centrify numbers together, it’s even more impressive and a powerful…


Thycotic and Centrify both named Leaders again in the 2021 Gartner Magic Quadrant for Privileged Access Management

July 21st, 2021

We’ve done it again! I’m very proud to share that both Thycotic and Centrify have again been recognized by Gartner as Leaders in the 2021 Gartner Magic Quadrant for Privileged Access Management (PAM). Evaluation by Gartner had already commenced before we announced the intent to combine as ThycoticCentrify in March 2021*. So this will be…


Case Study: High Security Architecture for Healthcare Networks

July 20th, 2021

Cyber attacks against the healthcare industry continue to rise. The recent cautionary tale of the University of Vermont Health Network’s ransomware scare is but one example of how attackers are ramping up to steal data and disrupt services. Hospitals are working to fortify their defenses to keep one step ahead of the bad guys. Even…


Privilege Elevation for Workstations and Servers

July 13th, 2021

“Start with the end in mind.” That’s how people tell you to face a challenge. While that’s true, the end can sometimes look so far away you feel overwhelmed before you even begin. When that happens, the best thing to do is set small, attainable goals along the way. You can use the same strategy…


How to Vacation Safely, Without Increasing Your Cyber Security Risk

July 6th, 2021

The combination of pandemic lockdowns and remote work has led to a stockpile of unspent PTO. With vaccination rates increasing and travel restrictions lifting, people are starting to use their vacation days in droves. But that doesn’t mean hackers -- or their bots -- are taking time off.  (Side note: Criminal hackers really should take time off. They’ve been working…


3 Top Takeaways from the 2021 Verizon Data Breach Investigations Report

June 29th, 2021

The 2021 Verizon Data Breach Investigations Report (DBIR) is here with the latest news and trends on the past year’s data breaches and security incidents. The Verizon DBIR is one of the industry’s top reports providing us with an indication of how well, or how poorly, our security efforts are performing, as well as giving…


Layered Privilege Security with Secret Server and Privilege Manager

June 22nd, 2021

Nearly all major data breaches involve both compromised endpoints and compromised privileged credentials. You must address both of these attack vectors in a layered security strategy to effectively lower your risk of a cyber attack. Layered security combines different security solutions into a coordinated, comprehensive strategy, the whole of which is greater than the sum…


ThycoticCentrify Day 60 Update: Customer Excitement, Innovation During Integration

June 17th, 2021

We’ve just completed Day 60 of our integration as ThycoticCentrify. I’m very excited about everything that our team has accomplished, how these two PAM industry leaders are coming together, and the positive feedback we’re hearing from customers. CUSTOMER EXCITEMENT Over the past 4+ months I’ve been able to engage with many Centrify and Thycotic customers,…


Account Lifecycle Manager Automates and Simplifies Cloud-Based Service Account Governance

June 15th, 2021

It’s easy for a service account to get “lost.” It happens when an original account owner leaves and neglects to pass on vital information about its purpose. Or when the system tied to the service account is no longer needed. Or, when a service account is set up for temporary purposes, like software installation or…


Interview: PAM Q&A with Dan Ritch

June 8th, 2021

It takes a village to develop ThycoticCentrify’s industry-leading Privileged Access Management solutions. I spoke with Dan Ritch, Senior Product Manager at ThycoticCentrify to discuss what it’s like to be a Product Manager at ThycoticCentrify and get his take on PAM for the cloud and how to drive adoption. What is your role at ThycoticCentrify? My…