Phone Number +1-202-802-9399 (US)

Thycotic is now Delinea!

Thycotic’s Cyber Security Blog


We’ve Moved

Thycotic and Centrify are now Delinea. Visit our new blog at for the latest content.

We've Moved

Filter by Tags: 

5 Reasons Why you Need a Modern PAM Solution Built for the Cloud

May 26th, 2022

Many legacy Privileged Access Management (PAM) solutions are still very manual regarding what they do and how they manage user access and permissions. They are geared toward the human administrator or designed for the data center, making them inadequate for complex and dynamic cloud-hosted infrastructures. Such traditional solutions cannot support large-scale cloud transformation initiatives requiring…

Top 5 RSA Sessions to Attend, The New Human Perimeter and Travel Tips to Survive

May 24th, 2022

It is that time of the year again for RSA Conference 2022, a bit later than expected but better late than never. It’s our opportunity for the global security community to come together and learn about the latest cybersecurity threats, security trends, innovations, and best practices to become more resilient against cyber-attacks. This year’s theme…

Cyber Insurance Case Studies: A Tale of Two Customers

May 17th, 2022

Delinea customers have been talking a lot about cyber insurance. Where to get it, what’s covered, and how to reduce their rates. We’ve been working with a variety of partners throughout the cyber insurance ecosystem to make sure our customers are well prepared to procure the right policy for them. Among Delinea customers, two recent…

SOC 2: The Ticket to Data Security Success

May 10th, 2022

Customer data protection is serious business—how do you know if an IT Sec company has the policies and procedures in place to protect your customer data? Enter the SOC 2 audit and certification. SOC 2, which stands for Service Organization Control, is a third-party certification that proves a company not only meets security regulatory requirements,…

Privilege Escalation on Windows: When You Want it and When You Don’t

May 3rd, 2022

Privilege escalation is the process by which a user with limited access to IT systems can increase the scope and scale of their access permissions. For trusted users, privilege escalation allows expanded access for a limited time to complete specific tasks. For example, users may need access to troubleshoot a technical problem, run a quarterly…

AD Bridging: If you’re only using it for authentication, you’re missing a ton of value

April 26th, 2022

There’s no way around it—enterprise networks today are hybrid with Windows, Linux, and UNIX systems in multiple clouds, leaving IT and IT Sec teams with the daunting task of managing access. For many years, Active Directory Bridging has helped by enabling users to log in to non-Windows systems with their enterprise Active Directory account. However,…

Mandatory MFA Everywhere: The Benefits of Stronger Authentication for Cloud Environments

April 19th, 2022

One of the biggest security threats today is the risk of compromised credentials and misuse of privileged accounts. Organizations of all sizes and verticals recognize the need to protect access to their applications, servers, and infrastructures. However, it is often hard to distinguish between a legitimate admin presenting a legitimate ID and password versus a…

Committing to Customers: Q&A with Shrilata Ganna, Delinea’s SVP of Customer Success and Professional Services

April 12th, 2022

We caught up with Delinea’s Senior Vice President of Customer Success and Professional Services to learn about how she coaches her teams and how she thinks about Delinea’s commitment to making customers the heroes of their PAM journey.    1. You manage two different teams at Delinea—customer success and professional services. What’s the difference in their…

Top 10 Cybersecurity Podcasts

April 5th, 2022

Two of the most important things we can do is learn and stay connected. I stay updated on the latest trends in cybersecurity by listening to the top cybersecurity podcasts. Each of the podcasts I have selected for this post has different values. From technical information, latest news and trends, and details on security incidents,…

Interview: Q&A with Delinea Chief Marketing Officer, Chris Smith

March 29th, 2022

In this conversation, we hear from Chris Smith, Chief Marketing Officer of Delinea, about the company’s recent rebranding, how marketing and IT can partner effectively, and the challenges of a changing privileged access management (PAM) industry. Chris shares a behind-the-scenes perspective on bringing Thycotic and Centrify together and insights into what customers can expect from…