
Passwords should be complex. Password management should be easy. Consumer password managers are popular solutions for personal password storage. These digital password vaults make it possible for people to have complex passwords for each website and application they use and help them avoid bad habits like writing passwords down or using the same password for…
The most recent Forrester Wave for privileged identity management recognized that machine identities (IDs) are growing at twice the rate of human identities. Much of this increase is due to the widespread adoption of Internet of Things (IoT) and automation through digital transformation initiatives that rely on cloud-based applications. The proliferation of connected devices and…
There are many different types of secrets in a digital enterprise. Secrets management requires broader and deeper security controls than traditional enterprise password management. It requires a coordinated process for managing all types of secrets in a centralized way to ensure systems and data remain secure. Secrets management keeps all secrets safe, prevents secret sprawl,…
The landscape of privileged accounts is becoming increasingly complex as organizations add new applications and change working styles in an ongoing COVID-19 world. Meanwhile, cyber criminals are only getting smarter. If you wait too long to plug your security gaps there’s a good chance they’ll find a way to exploit them. Forrester’s most recent Privileged…
Technologists, engineers, and future-focused organizations tout automation as the answer to consistency, reliability, and quality. Automation takes basic tasks out of human hands, freeing up human resources to focus on research, strategy, and planning. Even more, automated systems and services can work tirelessly around the clock. ITOps, DevOps, and SecOps leaders and architects are incredibly…
Over the past weeks, we've learned more about one of the biggest cyber attack on the software industry supply chain. This attack is a wake-up call for the software industry. It’s a true “mass indiscriminate global assault” as quoted by Brad Smith whom I regard as one of the most respected software leaders. His words…
The Thycotic team is excited to announce that we have been recognized as a Customers’ Choice in the January 2021 Gartner Peer Insights ‘Voice of the Customer’: Privileged Access Management Markets Large Enterprise, Finance, and North America. Our team at Thycotic takes great pride in this distinction, as customer feedback continues to shape our products…
Continuous learning is a top priority for me. It's critical to stay updated on the latest cyber security methods, technologies, strategies, and developments. 2020 brought the opportunity for us to indulge in some additional reading and learn new skills from incredible industry experts. From a young age, I struggled reading the likes of Shakespeare and…
Thycotic customers come in all shapes, sizes, and levels of experience. Some are new to PAM. Perhaps they recently inherited the program. Or maybe they’re building a PAM strategy from scratch. Our pro services team supports them at every stage of their journey. Some want more hands-on control. They prefer writing their own scripts, building…
There's a significant challenge facing organizations of all sizes today. They must find and retain IT staff with yesterday's IT expertise while also becoming subject matter experts (SMEs) on tomorrow's technology. The increasing trend is for organizations of all sizes to shift some or all of their IT staff to an outsourced provider. These teams,…