Phone Number +1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Articles in the ‘Uncategorized’ Category

Introducing ThycoticCentrify: Integrating Two Identity Security Leaders

April 13th, 2021

By Art Gilliland and Jim Legg Today, we are pleased to share that Centrify and Thycotic have merged to become one. This follows on the previously-announced acquisitions of Centrify and Thycotic by TPG Capital. We are now able to embark on the process of integrating our businesses and solutions to better serve our customers and…


Thycotic Recognized for Industry Leading Customer Service in 2021 SC Awards

April 1st, 2021

We are pleased to announce that Thycotic has been selected as a finalist in the “Best Customer Service” category of the 2021 SC Awards. For the last 24 years, the prestigious SC Awards have recognized the people, organizations and products that are forging the cybersecurity industry’s future and advancing the cause of safe and secure commerce and…


Thycotic Honored With a 5-Star Rating in the 2021 CRN® Partner Program Guide

March 29th, 2021

Washington, DC., March 29, 2021 – Thycotic, a provider of privileged access management (PAM) solutions to more than 12,500 organizations worldwide, including 25 of the Fortune 100, has received a 5-Star rating from CRN®, a brand of The Channel Company, in its 2021 Partner Program Guide. This annual guide provides a list of the most…


Thycotic President and CEO, James Legg, Named Executive of the Year 

March 25th, 2021

Thycotic’s own James Legg has been named Executive of the Year in the Global Excellence Award's Security Software category for his leadership in the cybersecurity space. As President and CEO, Legg has spearheaded a culture of talent at Thycotic, cultivating the organization’s overall success and revenue growth rate averaging 3x faster than others in the…


New Privilege Manager Release Extends Endpoint Protection for Macs

December 10th, 2019

Apple products continue to grow in popularity. With strong iPhone X and 11 sales, Apple is boosting their smartphone market share. And it’s not just consumer products where we’re seeing growth. Enterprises are using Macs more and more and Thycotic is seeing significant growth in these devices and operating systems. Endpoints present a significant security…


Thycotic Research Reveals Where Hackers and Security Professionals Agree and Where They Differ

September 12th, 2019

WASHINGTON, D.C., September 12, 2019 — Thycotic, provider of privileged access management (PAM) solutions to more than 10,000 organizations, including 20 percent of the Fortune 100, today released research results in a new report entitled, “Hackers & Security Professionals at Black Hat 2019: Where They Agree and Where They Differ.” The report finds service accounts are a…


The Top 5 PAM Tasks IT Teams Must Automate Part 2: Changing Network Passwords

June 21st, 2017

Automating Network Password Changing: A password that remains the same year in and year out is a hacker’s dream, and a breach waiting to happen. Fortunately, there are tools that can force users to change passwords after a set period of time, and can automate password changing to protect privileged accounts. In this 5-part Thycotic…


CYBER SMART: What does CISC stand for?

December 9th, 2016

Question of the Week: What does CISC stand for? Answer: Complex Instruction Set Computing The acronym stands for “Complex Instruction Set Computing” which is a type of microprocessor design. The design gives single instructions and executes low-level operations, but also has the capability to do multi-step operations all within a single instruction. The goal has since…


CYBER SMART: What new virus is making a big comeback?

December 2nd, 2016

Answer: Shamoon Virus It’s back and back with a vengeance. According to reports, the Shamoon malware contained embedded credentials that allowed the malware to move throughout the network and cause harm. To learn more about the virus and securing your enterprise read this blog.  Are you an InfoSec trivia guru? Each Friday we’ll test your InfoSec knowledge!…


CYBER SMART: What does PII stand for?

November 23rd, 2016

Question of the Week: What does PII stand for? Answer: Personal Identifiable Information Personal Identifiable Information defined by Wikipedia is, “Information that can be used on its own or with other information to identify, contact, or locate a single person, or to identify an individual in context.” This information is highly targeted by hackers so it…