Phone Number +1-202-802-9399 (US)

Thycotic is now Delinea!   delinea.com

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Articles in the ‘Industry News’ Category

Extended PAM (XPM): Intelligent automation for risk-based, adaptive privilege

September 15th, 2022

Why privileged access management must be extended In my previous blog, Extended PAM for integrated, multi-layered cyber defenses, I explored the reasons why we at Delinea believe that Privilege is the future of cybersecurity. Over the course of my career in cybersecurity, I’ve seen the rise of many promising solutions, but at the end of…


CISO Q&A with Delinea’s Stan Black

August 30th, 2022

As part of our interview series with Delinea’s leaders, we sat down with Stan Black, Chief Information Security Officer. Before joining Delinea, Stan was Chief Security and Intelligence Officer at Lattice Security, SVP, Chief Security Officer, and Chief Information Officer at Citrix. Prior to Citrix. Stan was Chief Security Officer at Nuance. He was also…


How Just-in-Time privilege elevation prevents data breaches and lateral movement

August 23rd, 2022

In the weeks that followed the high-profile attack on the SolarWinds supply chain, it became clear that the threat actors infiltrated the company’s internal networks and cloud infrastructure through unrestricted privileged access. Once inside the network, they were able to move laterally in the system. This attack and many others reinforce the importance of an…


Extended PAM for integrated, multi-layered cyber defenses

July 28th, 2022

Increasing IT complexity and an endless array of IAM and cybersecurity tools make it challenging to combat privileged account attacks effectively. As a PAM industry leader, Delinea is creating a future in which you can understand, manage, and defend your entire privileged attack surface from a single solution across both traditional and emerging use cases.…


Delinea Named a Leader Again in the 2022 Gartner® Magic Quadrant™ for Privileged Access Management

July 22nd, 2022

I’m very proud to share that Delinea has been named a Leader in the 2022 Gartner Magic Quadrant for Privileged Access Management (PAM). Download the Report: https://delinea.com/resources/gartner-magic-quadrant-pam


Privileged Access for Cloud-Native Workloads (Cloud PAM): Securing Identities in dynamic environments; on-premise, hybrid & public cloud

June 21st, 2022

Many factors from cost savings, convenience, zero trust, remote access, and work from home have most organizations fully immersed in cloud migration. It is now a question of how much technology and assets to deploy in the cloud and how fast. Organizations are leveraging a combination of SaaS, IaaS, or PaaS models and hosting their…


Top 5 RSA Sessions to Attend, The New Human Perimeter and Travel Tips to Survive

May 24th, 2022

It is that time of the year again for RSA Conference 2022, a bit later than expected but better late than never. It’s our opportunity for the global security community to come together and learn about the latest cybersecurity threats, security trends, innovations, and best practices to become more resilient against cyber-attacks. This year’s theme…


Cyber Insurance Case Studies: A Tale of Two Customers

May 17th, 2022

Delinea customers have been talking a lot about cyber insurance. Where to get it, what’s covered, and how to reduce their rates. We’ve been working with a variety of partners throughout the cyber insurance ecosystem to make sure our customers are well prepared to procure the right policy for them. Among Delinea customers, two recent…


SOC 2: The Ticket to Data Security Success

May 10th, 2022

Customer data protection is serious business—how do you know if an IT Sec company has the policies and procedures in place to protect your customer data? Enter the SOC 2 audit and certification. SOC 2, which stands for Service Organization Control, is a third-party certification that proves a company not only meets security regulatory requirements,…


Top 10 Cybersecurity Podcasts

April 5th, 2022

Two of the most important things we can do is learn and stay connected. I stay updated on the latest trends in cybersecurity by listening to the top cybersecurity podcasts. Each of the podcasts I have selected for this post has different values. From technical information, latest news and trends, and details on security incidents,…