Phone Number +1-202-802-9399 (US)

Thycotic’s Cyber Security Blog

FEATURED STORY:

A Guide to Managing and Securing Privileged Users

Gain a practical understanding of different types of users with a focus on privileged users and privileged user management

Privileged Users Blog Post

Filter by Tags: 

The Password Spreadsheet: Why NOT to store your passwords in Excel

October 14th, 2021

Is your organization still using an Excel password spreadsheet to store and manage sensitive passwords—the keys to your kingdom? You’re not alone. But storing privileged account passwords and credentials in an Excel spreadsheet poses a serious security risk. Excel was never intended to be a password manager, so there’s no chance it’s ever going to…


Limit Privileged Access for Third-Party Vendors Without Restricting their Ability to Get Work Done

October 12th, 2021

Companies often work with outside experts, consultants, and other third-party vendors who need privileged access to corporate resources. You may be engaging with third-party vendors in a number of different ways, such as a remote contractor working on a time-limited project, an embedded contractor, or outsourced staff augmentation. These third-party entities can’t do what they…


Privileged Password Management 101: What exactly is PPM?

October 5th, 2021

Let’s reduce password pain and move passwords into the background Passwords remain one of the top challenges and causes of cyber fatigue for employees. As we move more of our business and lives online this means the number of credentials needed to protect our identities continues to grow. Unfortunately, a single password is sometimes the…


Interview: PAM Product Q&A with Richard Wang

September 28th, 2021

It takes a village to develop ThycoticCentrify’s industry-leading Privileged Access Management solutions. I spoke with Richard Wang, Senior Director of Product Management at ThycoticCentrify to discuss what it’s like to lead the product team, how we develop our product roadmap, and advice for those starting and continuing along their PAM journey. Sara: Hi Richard, thank…


Privilege Manager Offers Increased Flexibility and Enterprise-Wide Security

September 21st, 2021

No enterprise is alike in the way they organize privileged users or choose to connect IT systems.  The latest release of Privilege Manager provides greater flexibility and choice by supporting diverse models for computer management and identity federation. For organizations that manage a variety of privileged users, business units, and connected technologies, Privilege Manager now…


Zero Trust for ICS/SCADA Systems

September 14th, 2021

Society today is heavily dependent on critical infrastructure that mostly works behind the scenes such as power stations, oil refineries, agriculture operations, mining, water treatment, green energy, transportation, and manufacturing operations. These systems help deliver electricity to power our homes, recharge our phones and vehicles, deliver goods using just-in-time (JIT) manufacturing processes or simply provide…


What Small Businesses Need to Know About Cyber Security and Password Management

September 7th, 2021

Small to medium businesses (SMBs) made tough choices this past year to keep their business running. Staff scattered to work from home—unexpectedly—and SMBs had to quickly enable them with tools and support to stay connected. Many small companies were forced to sacrifice cyber security best practices in favor of business productivity, increasing their risk of…


Thycotic and Centrify Recognized Again as Leaders in New 2021 KuppingerCole Leadership Compass for PAM

September 1st, 2021

As we announced our merger in March and began our integration, Thycotic and Centrify were in the process of being evaluated separately by KuppingerCole for its 2021 Leadership Compass for Privileged Access Management (PAM). Not surprisingly, both Thycotic and Centrify were named Overall Leaders again, as well as earning leadership positions in the major categories…


Approval Workflows and Notifications for Busy People

August 31st, 2021

Maybe it's happened to you. You deleted a service account because it didn’t seem like any processes were tied to it. And then something broke. Privilege management mistakes happen—but they don’t have to. Setting up an end-to-end workflow for privileged account governance decreases the risk of mistakenly pulling the plug on an important process. The…


Certificate-Based Authentication and TTL for All Cloud Platforms

August 24th, 2021

DevOps is a world of machines. To access systems and data, secrets are exchanged between all types of machines, including databases and applications for software and infrastructure deployment, testing, orchestration, configuration, and Robotic Process Automation (RPA).    The speed and scale of DevOps requires secrets to be created instantly, tracked incessantly, and eliminated when no longer…