Phone Number +1-202-802-9399 (US)

ThycoticCentrify is now Delinea!   delinea.com

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘Cloud Security’

Mandatory MFA Everywhere: The Benefits of Stronger Authentication for Cloud Environments

April 19th, 2022

One of the biggest security threats today is the risk of compromised credentials and misuse of privileged accounts. Organizations of all sizes and verticals recognize the need to protect access to their applications, servers, and infrastructures. However, it is often hard to distinguish between a legitimate admin presenting a legitimate ID and password versus a…


New Research from Delinea Reveals Cloud Automation is Critical to Future-Proofing Cybersecurity

March 22nd, 2022

The cybersecurity landscape is rapidly changing as companies transition from the pandemic and assess their changing security needs.     As a new Delinea report explains, businesses need to shift their focus from merely surviving to embracing new security strategies that enable them to thrive in today’s unpredictable world. Security leaders need to take an honest look…


Reducing Cloud Security Complexity with Seamless Privileged Access Management Built for the Cloud

March 1st, 2022

Controlling access is one of the biggest concerns with multi-cloud security. Identity-related security breaches remain a top concern in our hybrid, multi-cloud world. With assets distributed across on-premise and the cloud, IT struggles to secure them and provide admins, internal employees, contractors, and outsourced IT with secure remote access in a controlled fashion with unified…


Seamless Server Security for a Hybrid IT Environment

February 22nd, 2022

Servers are the areas of the enterprise attack surface with the greatest risk. That’s where the crown jewels live. They house protected health information, credit card transactions, and intellectual property. All manners of sensitive data are found on servers. And yet, many organizations have insufficient server security.


An Ethical Hacker’s Guide to IoT Security Risks and Challenges: Part 1

November 30th, 2021

This post is part of a series about IoT security risks and how you can minimize them. Read Part 2 here. Welcome to the world of IoT (Internet of Things). More devices get connected online every minute, with more than 9-billion devices performing all sorts of tasks and automation. Every day, employees power up their…


Cloud Security Best Practices Checklist

November 2nd, 2021

Transitioning to the cloud is one of the most significant technology shifts your company will face. Over 80% of organizations operating in the cloud have experienced at least one compromised account each month, stemming from external actors, malicious insiders, or unintentional mistakes. The specifics of cloud security activities may vary depending on your cloud platforms…


Smarter, More Modern PAM: Secret Server Integration with the Platform Plus Cloud Suite Enhancements

October 27th, 2021

ThycoticCentrify’s latest release evolves our Privileged Access Management (PAM) solutions along two critical strategic paths. Firstly, we’re blending Thycotic and Centrify PAM products, so you benefit from the very best PAM capabilities from two of the industry’s market leaders. As an example, existing Secret Server customers will now be able to take advantage of flagship…


Interview: PAM Product Q&A with Richard Wang

September 28th, 2021

It takes a village to develop ThycoticCentrify’s industry-leading Privileged Access Management solutions. I spoke with Richard Wang, Senior Director of Product Management at ThycoticCentrify to discuss what it’s like to lead the product team, how we develop our product roadmap, and advice for those starting and continuing along their PAM journey. Sara: Hi Richard, thank…


Privilege Manager Offers Increased Flexibility and Enterprise-Wide Security

September 21st, 2021

No enterprise is alike in the way they organize privileged users or choose to connect IT systems.  The latest release of Privilege Manager provides greater flexibility and choice by supporting diverse models for computer management and identity federation. For organizations that manage a variety of privileged users, business units, and connected technologies, Privilege Manager now…


Certificate-Based Authentication and TTL for All Cloud Platforms

August 24th, 2021

DevOps is a world of machines. To access systems and data, secrets are exchanged between all types of machines, including databases and applications for software and infrastructure deployment, testing, orchestration, configuration, and Robotic Process Automation (RPA).    The speed and scale of DevOps requires secrets to be created instantly, tracked incessantly, and eliminated when no longer…