Phone Number +1-202-802-9399 (US)

ThycoticCentrify is now Delinea!   delinea.com

Thycotic’s Cyber Security Blog

FEATURED STORY:

We’ve Moved

Thycotic and Centrify are now Delinea. Visit our new blog at delinea.com/blog for the latest content.

We've Moved

Filter by Tags: 

Cyber Insurance Case Studies: A Tale of Two Customers

May 17th, 2022

Delinea customers have been talking a lot about cyber insurance. Where to get it, what’s covered, and how to reduce their rates. We’ve been working with a variety of partners throughout the cyber insurance ecosystem to make sure our customers are well prepared to procure the right policy for them. Among Delinea customers, two recent…


SOC 2: The Ticket to Data Security Success

May 10th, 2022

Customer data protection is serious business—how do you know if an IT Sec company has the policies and procedures in place to protect your customer data? Enter the SOC 2 audit and certification. SOC 2, which stands for Service Organization Control, is a third-party certification that proves a company not only meets security regulatory requirements,…


Privilege Escalation on Windows: When You Want it and When You Don’t

May 3rd, 2022

Privilege escalation is the process by which a user with limited access to IT systems can increase the scope and scale of their access permissions. For trusted users, privilege escalation allows expanded access for a limited time to complete specific tasks. For example, users may need access to troubleshoot a technical problem, run a quarterly…


AD Bridging: If you’re only using it for authentication, you’re missing a ton of value

April 26th, 2022

There’s no way around it—enterprise networks today are hybrid with Windows, Linux, and UNIX systems in multiple clouds, leaving IT and IT Sec teams with the daunting task of managing access. For many years, Active Directory Bridging has helped by enabling users to log in to non-Windows systems with their enterprise Active Directory account. However,…


Mandatory MFA Everywhere: The Benefits of Stronger Authentication for Cloud Environments

April 19th, 2022

One of the biggest security threats today is the risk of compromised credentials and misuse of privileged accounts. Organizations of all sizes and verticals recognize the need to protect access to their applications, servers, and infrastructures. However, it is often hard to distinguish between a legitimate admin presenting a legitimate ID and password versus a…


https://thycotic.com/wp-content/uploads/2022/04/delinea-shrilata-ganna-q-and-a-blog-1024x536.jpg

Committing to Customers: Q&A with Shrilata Ganna, Delinea’s SVP of Customer Success and Professional Services

April 12th, 2022

We caught up with Delinea’s Senior Vice President of Customer Success and Professional Services to learn about how she coaches her teams and how she thinks about Delinea’s commitment to making customers the heroes of their PAM journey.    1. You manage two different teams at Delinea—customer success and professional services. What’s the difference in their…


Top 10 Cybersecurity Podcasts

April 5th, 2022

Two of the most important things we can do is learn and stay connected. I stay updated on the latest trends in cybersecurity by listening to the top cybersecurity podcasts. Each of the podcasts I have selected for this post has different values. From technical information, latest news and trends, and details on security incidents,…


Interview: Q&A with Delinea Chief Marketing Officer, Chris Smith

March 29th, 2022

In this conversation, we hear from Chris Smith, Chief Marketing Officer of Delinea, about the company’s recent rebranding, how marketing and IT can partner effectively, and the challenges of a changing privileged access management (PAM) industry. Chris shares a behind-the-scenes perspective on bringing Thycotic and Centrify together and insights into what customers can expect from…


SHIELDS UP = Recheck Your Security to be Incident Response-Ready

March 24th, 2022

The stability of the world has significantly eroded in the past few weeks with the catastrophic war that has caused devastation and a humanitarian crisis in Ukraine … As the war on the ground continues to escalate, the information war is also intensifying. The battle rages between truth and propaganda, with cyberattacks as powerful weapons.


New Research from Delinea Reveals Cloud Automation is Critical to Future-Proofing Cybersecurity

March 22nd, 2022

The cybersecurity landscape is rapidly changing as companies transition from the pandemic and assess their changing security needs.     As a new Delinea report explains, businesses need to shift their focus from merely surviving to embracing new security strategies that enable them to thrive in today’s unpredictable world. Security leaders need to take an honest look…