Phone Number +1-202-802-9399 (US)

Thycotic is now Delinea!   delinea.com

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘Cloud Security’

Ethical Hacker Tips for Securing the Cloud

August 16th, 2022

Is the cloud safer than traditional on-premise computing environments? Can the cloud be hacked? Is it safer to use the cloud as storage for all things digital? These questions are asked all the time by people inside IT and out.


Privileged Access for Cloud-Native Workloads (Cloud PAM): Securing Identities in dynamic environments; on-premise, hybrid & public cloud

June 21st, 2022

Many factors from cost savings, convenience, zero trust, remote access, and work from home have most organizations fully immersed in cloud migration. It is now a question of how much technology and assets to deploy in the cloud and how fast. Organizations are leveraging a combination of SaaS, IaaS, or PaaS models and hosting their…


5 Reasons Why you Need a Modern PAM Solution Built for the Cloud

May 26th, 2022

Many legacy Privileged Access Management (PAM) solutions are still very manual regarding what they do and how they manage user access and permissions. They are geared toward the human administrator or designed for the data center, making them inadequate for complex and dynamic cloud-hosted infrastructures. Such traditional solutions cannot support large-scale cloud transformation initiatives requiring…


Mandatory MFA Everywhere: The Benefits of Stronger Authentication for Cloud Environments

April 19th, 2022

One of the biggest security threats today is the risk of compromised credentials and misuse of privileged accounts. Organizations of all sizes and verticals recognize the need to protect access to their applications, servers, and infrastructures. However, it is often hard to distinguish between a legitimate admin presenting a legitimate ID and password versus a…


New Research from Delinea Reveals Cloud Automation is Critical to Future-Proofing Cybersecurity

March 22nd, 2022

The cybersecurity landscape is rapidly changing as companies transition from the pandemic and assess their changing security needs.     As a new Delinea report explains, businesses need to shift their focus from merely surviving to embracing new security strategies that enable them to thrive in today’s unpredictable world. Security leaders need to take an honest look…


Reducing Cloud Security Complexity with Seamless Privileged Access Management Built for the Cloud

March 1st, 2022

Controlling access is one of the biggest concerns with multi-cloud security. Identity-related security breaches remain a top concern in our hybrid, multi-cloud world. With assets distributed across on-premise and the cloud, IT struggles to secure them and provide admins, internal employees, contractors, and outsourced IT with secure remote access in a controlled fashion with unified…


Seamless Server Security for a Hybrid IT Environment

February 22nd, 2022

Servers are the areas of the enterprise attack surface with the greatest risk. That’s where the crown jewels live. They house protected health information, credit card transactions, and intellectual property. All manners of sensitive data are found on servers. And yet, many organizations have insufficient server security.


An Ethical Hacker’s Guide to IoT Security Risks and Challenges: Part 1

November 30th, 2021

This post is part of a series about IoT security risks and how you can minimize them. Read Part 2 here. Welcome to the world of IoT (Internet of Things). More devices get connected online every minute, with more than 9-billion devices performing all sorts of tasks and automation. Every day, employees power up their…


Cloud Security Best Practices Checklist

November 2nd, 2021

Transitioning to the cloud is one of the most significant technology shifts your company will face. Over 80% of organizations operating in the cloud have experienced at least one compromised account each month, stemming from external actors, malicious insiders, or unintentional mistakes. The specifics of cloud security activities may vary depending on your cloud platforms…


Smarter, More Modern PAM: Secret Server Integration with the Platform Plus Cloud Suite Enhancements

October 27th, 2021

ThycoticCentrify’s latest release evolves our Privileged Access Management (PAM) solutions along two critical strategic paths. Firstly, we’re blending Thycotic and Centrify PAM products, so you benefit from the very best PAM capabilities from two of the industry’s market leaders. As an example, existing Secret Server customers will now be able to take advantage of flagship…