Phone Number +1-202-802-9399 (US)

Thycotic’s Cyber Security Blog

FEATURED STORY:

A Guide to Managing and Securing Privileged Users

Gain a practical understanding of different types of users with a focus on privileged users and privileged user management

Privileged Users Blog Post

Filter by Tags: 

Certificate-Based Authentication and TTL for All Cloud Platforms

August 24th, 2021

DevOps is a world of machines. To access systems and data, secrets are exchanged between all types of machines, including databases and applications for software and infrastructure deployment, testing, orchestration, configuration, and Robotic Process Automation (RPA).    The speed and scale of DevOps requires secrets to be created instantly, tracked incessantly, and eliminated when no longer…


Six Questions Secret Server Answers in the Latest Updates

August 17th, 2021

You asked and we answered. We’ve been listening to questions Secret Server customers ask and working hard to make the industry’s top PAM solution even better. We’re excited to share a batch of updates to Secret Server that address your top concerns. 1. Is it possible to get rid of secrets and related data after…


Zero Trust Privilege for PAM Dummies eBook

August 10th, 2021

Security is Broken. Long Live Security. At ThycoticCentrify, cyber security is our bag. We’ve blogged about how identity-based breaches are on the rise, fueled by a perfect storm of conditions that include cloud transformation, an expanding attack surface, and wholesale remote VPN-based access due to the increase in work from home. Businesses worldwide are deploying…


Give Your Cyber Security Career a Boost

August 3rd, 2021

While the shortage of qualified cyber security professionals continues to grow exponentially and ransomware attacks grab international headlines, many mid-career IT professionals with cyber security job experience are evaluating their options. Maybe a year of working remotely has given you pause to think about your career goals and take some time to learn new skills.…


Black Hat USA 2021 – Top 5 Sessions to Attend & Tips to Survive Now that Conferences are Back In-Person

July 29th, 2021

It is that time of the year again—hacker summer camp is back! In 2020, the global pandemic dramatically changed our social environment, and both Black Hat and Defcon went virtual with in-person networking and parties placed on hold. This year, both events are back with a hybrid flavor to them. Black Hat USA, Saturday, July…


Cyber Security Wakeup Call: New Global Research Shows Remote Workers Face Tough Choices Between Productivity and Security

July 27th, 2021

ThycoticCentrify just completed a global cyber security survey among 8,000+ knowledge workers in 15 countries in partnership with Sapio Research. Survey results reveal a disturbing (if not surprising) disconnect between an understanding of cyber security risks in 2021 and the risky activities employees engage in every day to get their jobs done. This new survey…


Day 90 Merger Update: Momentum During Integration Delivers a Great Q2 for ThycoticCentrify

July 22nd, 2021

Last week we passed the 90-day mark as we continue our integration journey as ThycoticCentrify. We also got a detailed look at our company performance during Q2. Across the board, it was clearly a hugely successful quarter for ThycoticCentrify. When you put the Thycotic and Centrify numbers together, it’s even more impressive and a powerful…


Thycotic and Centrify both named Leaders again in the 2021 Gartner Magic Quadrant for Privileged Access Management

July 21st, 2021

We’ve done it again! I’m very proud to share that both Thycotic and Centrify have again been recognized by Gartner as Leaders in the 2021 Gartner Magic Quadrant for Privileged Access Management (PAM). Evaluation by Gartner had already commenced before we announced the intent to combine as ThycoticCentrify in March 2021*. So this will be…


Case Study: High Security Architecture for Healthcare Networks

July 20th, 2021

Cyber attacks against the healthcare industry continue to rise. The recent cautionary tale of the University of Vermont Health Network’s ransomware scare is but one example of how attackers are ramping up to steal data and disrupt services. Hospitals are working to fortify their defenses to keep one step ahead of the bad guys. Even…


Privilege Elevation for Workstations and Servers

July 13th, 2021

“Start with the end in mind.” That’s how people tell you to face a challenge. While that’s true, the end can sometimes look so far away you feel overwhelmed before you even begin. When that happens, the best thing to do is set small, attainable goals along the way. You can use the same strategy…