Phone Number +1-202-802-9399 (US)

Thycotic’s Cyber Security Blog

FEATURED STORY:

How to Remove Admin Rights Without Reducing Productivity

Mitigate risks related to over-privileged users to secure your endpoints and ensure compliance

Filter by Tags: 

Stronger Secrets Management in the Latest Version of Secret Server

April 15th, 2021

Secrets management requires broader and deeper security controls than traditional enterprise PAM. The latest release of Thycotic Secret Server provides stronger secrets management than ever before. Usability, workflow, and reporting enhancements to Secret Server save you time and strengthen your attack surface. Remove roadblocks in the approval workflow  Secret Server’s approval workflows increase visibility and…


Introducing ThycoticCentrify: Integrating Two Identity Security Leaders

April 13th, 2021

By Art Gilliland and Jim Legg Today, we are pleased to share that Centrify and Thycotic have merged to become one. This follows on the previously-announced acquisitions of Centrify and Thycotic by TPG Capital. We are now able to embark on the process of integrating our businesses and solutions to better serve our customers and…


Beazley Improves Security Compliance and Saves Time on Audits

April 6th, 2021

Specialist insurer Beazley has exponentially more secrets than employees. The volume and variety of their privileged accounts made them difficult to manage and time-consuming to audit. An external security audit identified gaps in Beazley’s secrets management processes that opened the door to potential privileged account attacks. “The audit discovered privileged account passwords that hadn’t been…


Thycotic Recognized for Industry Leading Customer Service in 2021 SC Awards

April 1st, 2021

We are pleased to announce that Thycotic has been selected as a finalist in the “Best Customer Service” category of the 2021 SC Awards. For the last 24 years, the prestigious SC Awards have recognized the people, organizations and products that are forging the cybersecurity industry’s future and advancing the cause of safe and secure commerce and…


Privileged Identity Management (PIM) and Identity-Centric Security Controls

April 1st, 2021

The number of identities in the enterprise is exploding. Gaining control of identities related to people as well as machines is a challenge for many organizations. You need to know who your users are and what they do. If you experience a security incident, you must be able to reverse engineer who did what in…


Securing and Hardening Linux and Unix Endpoints Against Cyber Attack: Part IV

March 30th, 2021

This post is part of a series on securing your endpoints against cyber attacks. Read: Part I | Part II | Part III | Part IV How Secure are your Linux Endpoints? An Ethical Hacker’s Guide to Securing and Hardening Linux and Unix Endpoints Welcome to the next post in our series on hardening and…


Thycotic President and CEO, James Legg, Named Executive of the Year 

March 25th, 2021

Thycotic’s own James Legg has been named Executive of the Year in the Global Excellence Award's Security Software category for his leadership in the cybersecurity space. As President and CEO, Legg has spearheaded a culture of talent at Thycotic, cultivating the organization’s overall success and revenue growth rate averaging 3x faster than others in the…


Securing and Hardening Linux and Unix Endpoints Against Cyber Attack: Part III

March 23rd, 2021

This post is part of a series on securing your endpoints against cyber attacks. Read: Part I | Part II | Part III | Part IV How Secure are your Linux Endpoints? An Ethical Hacker’s Guide to Securing and Hardening Linux and Unix Endpoints Welcome to the next post in our series on hardening and…


Beyond Password Managers

March 16th, 2021

Passwords should be complex. Password management should be easy. Consumer password managers are popular solutions for personal password storage. These digital password vaults make it possible for people to have complex passwords for each website and application they use and help them avoid bad habits like writing passwords down or using the same password for…


Protecting IoT and Machine Identities (IDs) with Automated PAM Tools

March 11th, 2021

The most recent Forrester Wave for privileged identity management recognized that machine identities (IDs) are growing at twice the rate of human identities.  Much of this increase is due to the widespread adoption of Internet of Things (IoT) and automation through digital transformation initiatives that rely on cloud-based applications. The proliferation of connected devices and…