Phone Number +1-202-802-9399 (US)

Thycotic is now Delinea!   delinea.com

Thycotic’s Cyber Security Blog

FEATURED STORY:

We’ve Moved

Thycotic and Centrify are now Delinea. Visit our new blog at delinea.com/blog for the latest content.

We've Moved

Filter by Tags: 

Extended PAM for integrated, multi-layered cyber defenses

July 28th, 2022

Increasing IT complexity and an endless array of IAM and cybersecurity tools make it challenging to combat privileged account attacks effectively. As a PAM industry leader, Delinea is creating a future in which you can understand, manage, and defend your entire privileged attack surface from a single solution across both traditional and emerging use cases.…


Delinea Named a Leader Again in the 2022 Gartner® Magic Quadrant™ for Privileged Access Management

July 22nd, 2022

I’m very proud to share that Delinea has been named a Leader in the 2022 Gartner Magic Quadrant for Privileged Access Management (PAM). Download the Report: https://delinea.com/resources/gartner-magic-quadrant-pam


Privileged Account Security Simplified | Free eBook

July 19th, 2022

The classic cybersecurity perimeter no longer exists. Today’s cybersecurity is a race against cybercriminals and their expanding networks that have become big business. Ransomware, malware, exploits, and social engineering techniques are constantly evolving, and damages to cybercrime victims are drastically increasing.


Securing Active Directory to Reduce Ransomware Attacks: A Quick Primer

July 12th, 2022

Ransomware attacks are increasing in size and complexity, putting organizations across all industries at risk for account lockouts, extortion attempts, and data loss. In fact, the latest research indicates ransomware attacks are up by 80% year-over-year. In large part, this is because most ransomware families—the code signatures and malicious commands that carry out ransomware attacks—are now…


Passwordless authentication: making the vision a reality

July 5th, 2022

The concept of passwordless authentication has been getting a lot of hype. And for good reason. The human element accounts for most data breaches, with 82% stemming from stolen passwords, phishing, misuse, and errors. The idea that users wouldn’t need to create and remember complex passwords, store them in a password vault, or regularly change…


Key Takeaways from the Verizon Data Breach Investigations Report 2022

June 28th, 2022

Every year I anxiously await the publication of the Verizon Data Breach Investigations Report (DBIR). This annual tome is a virtual Mecca that draws a worldwide audience of security practitioners. We savor its insights and analysis of information security incidents and breaches. Heavy on data gleaned from actual investigations, it can be a little dry…


Privileged Access for Cloud-Native Workloads (Cloud PAM): Securing Identities in dynamic environments; on-premise, hybrid & public cloud

June 21st, 2022

Many factors from cost savings, convenience, zero trust, remote access, and work from home have most organizations fully immersed in cloud migration. It is now a question of how much technology and assets to deploy in the cloud and how fast. Organizations are leveraging a combination of SaaS, IaaS, or PaaS models and hosting their…


Secure Remote Access Paradigms Pros and Cons

June 14th, 2022

Remote users expect instant connectivity so they can access the same systems they use when in the office. However, increasingly complex hybrid cloud, multi-cloud, and on-premise infrastructures make remote privileged access more difficult for IT teams to manage and secure using traditional access management techniques. Therefore, enterprises need a flexible, easy-to-use method for secure remote…


Improve cyber resilience and speed disaster recovery with the latest version of Secret Server

June 7th, 2022

Disaster can come in many forms. A ransomware attack. A malicious insider. Or, a natural disaster. Any of these can cause a widespread system or network outage that prevents critical access to systems. When disaster strikes, it’s critical to recover quickly. The problem is that most businesses aren’t ready to respond to an unplanned outage.


Conversational Geek shows you how to contain the blast radius of a server attack

May 31st, 2022

Cybersecurity insiders love jargon. The language in most cybersecurity whitepapers and webinars is just as tangled and opaque as legacy tech in a typical IT environment. That’s why it’s no wonder cyber leaders have such difficulty building a common understanding with other technical teams, business users, and company leadership. It’s also no wonder many people…