Phone Number +1-202-802-9399 (US)

Thycotic’s Cyber Security Blog

FEATURED STORY:

A Guide to Managing and Securing Privileged Users

Gain a practical understanding of different types of users with a focus on privileged users and privileged user management

Privileged Users Blog Post

Filter by Tags: 

How to Vacation Safely, Without Increasing Your Cyber Security Risk

July 6th, 2021

The combination of pandemic lockdowns and remote work has led to a stockpile of unspent PTO. With vaccination rates increasing and travel restrictions lifting, people are starting to use their vacation days in droves. But that doesn’t mean hackers -- or their bots -- are taking time off.  (Side note: Criminal hackers really should take time off. They’ve been working…


3 Top Takeaways from the 2021 Verizon Data Breach Investigations Report

June 29th, 2021

The 2021 Verizon Data Breach Investigations Report (DBIR) is here with the latest news and trends on the past year’s data breaches and security incidents. The Verizon DBIR is one of the industry’s top reports providing us with an indication of how well, or how poorly, our security efforts are performing, as well as giving…


Layered Privilege Security with Secret Server and Privilege Manager

June 22nd, 2021

Nearly all major data breaches involve both compromised endpoints and compromised privileged credentials. You must address both of these attack vectors in a layered security strategy to effectively lower your risk of a cyber attack. Layered security combines different security solutions into a coordinated, comprehensive strategy, the whole of which is greater than the sum…


ThycoticCentrify Day 60 Update: Customer Excitement, Innovation During Integration

June 17th, 2021

We’ve just completed Day 60 of our integration as ThycoticCentrify. I’m very excited about everything that our team has accomplished, how these two PAM industry leaders are coming together, and the positive feedback we’re hearing from customers. CUSTOMER EXCITEMENT Over the past 4+ months I’ve been able to engage with many Centrify and Thycotic customers,…


Account Lifecycle Manager Automates and Simplifies Cloud-Based Service Account Governance

June 15th, 2021

It’s easy for a service account to get “lost.” It happens when an original account owner leaves and neglects to pass on vital information about its purpose. Or when the system tied to the service account is no longer needed. Or, when a service account is set up for temporary purposes, like software installation or…


Interview: PAM Q&A with Dan Ritch

June 8th, 2021

It takes a village to develop ThycoticCentrify’s industry-leading Privileged Access Management solutions. I spoke with Dan Ritch, Senior Product Manager at ThycoticCentrify to discuss what it’s like to be a Product Manager at ThycoticCentrify and get his take on PAM for the cloud and how to drive adoption. What is your role at ThycoticCentrify? My…


Best Practices to Incorporate DevOps in Enterprise Security

June 1st, 2021

It’s impossible to make an organization 100% impenetrable. You may have all the right security policies and tools. But, no matter how quickly you shore up your defenses, cyber criminals just keep getting faster. To avoid becoming the next victim of a cyber attack, you just need to outrun the guy next to you. That’s…


Cyber Incident Response Checklist and Plan: Are You Breach-Ready?

May 27th, 2021

It’s not rare to see cyber-attacks in the daily news. From ransomware to data breaches to DDoS (Distributed Denial of Service) attacks, the incident is usually attributed to either cybercriminals or nation-states, and almost always comes from beyond our own country’s borders and laws. Because of this, we worry about clicking on a web page…


Azure Sentinel Now Integrates with Secret Server for Better Visibility and Faster Incidence Response

May 25th, 2021

Complex, dynamic organizations often have dozens of platforms to manage, each monitoring a different aspect of the security stack. Many Microsoft shops use Azure Sentinel as the single source of truth for security logging. Sentinel aggregates data from multiple security solutions and automates much of the noise away so that security teams can focus on…


New Ransomware Model Presumes Honor Among Thieves

May 20th, 2021

Ransomware is now big business, part of a production line of organized cyber crime. Thanks to ransomware’s new “affiliate” model, not only are attacks increasing in frequency, but they’re also becoming more sophisticated, successful, and damaging. This new affiliate model is also known as Ransomware-as-a-Service Ransomware attacks have victimized multiple organizations including TV stations, airplane…