Phone Number +1-202-802-9399 (US)

ThycoticCentrify is now Delinea!

Thycotic’s CyberSecurity Publication


Filter by Tags: 

Posts Tagged ‘Cyber Security Hot Topics’

Cyber Insurance Case Studies: A Tale of Two Customers

May 17th, 2022

Delinea customers have been talking a lot about cyber insurance. Where to get it, what’s covered, and how to reduce their rates. We’ve been working with a variety of partners throughout the cyber insurance ecosystem to make sure our customers are well prepared to procure the right policy for them. Among Delinea customers, two recent…

Top 10 Cybersecurity Podcasts

April 5th, 2022

Two of the most important things we can do is learn and stay connected. I stay updated on the latest trends in cybersecurity by listening to the top cybersecurity podcasts. Each of the podcasts I have selected for this post has different values. From technical information, latest news and trends, and details on security incidents,…

Interview: Q&A with Delinea Chief Marketing Officer, Chris Smith

March 29th, 2022

In this conversation, we hear from Chris Smith, Chief Marketing Officer of Delinea, about the company’s recent rebranding, how marketing and IT can partner effectively, and the challenges of a changing privileged access management (PAM) industry. Chris shares a behind-the-scenes perspective on bringing Thycotic and Centrify together and insights into what customers can expect from…

SHIELDS UP = Recheck Your Security to be Incident Response-Ready

March 24th, 2022

The stability of the world has significantly eroded in the past few weeks with the catastrophic war that has caused devastation and a humanitarian crisis in Ukraine … As the war on the ground continues to escalate, the information war is also intensifying. The battle rages between truth and propaganda, with cyberattacks as powerful weapons.

Cyber Insurance: What Is It, and Why Do You Need It?

March 8th, 2022

A new arm of the insurance industry is emerging to help your business mitigate risk: cybersecurity insurance. Cyber insurance offers a safety net for businesses threatened by the rapid growth of insider cyber crime and external cyber threats, particularly ransomware. While cyber insurance has been a reliable safety net for years—things are changing fast.

We’ve Moved

February 1st, 2022

We are excited to share that, after the merger of Thycotic and Centrify in April 2021, we have officially emerged as Delinea, the leading provider of privileged access management (PAM) solutions for seamless security! That doesn’t mean you won’t get that same great content you have enjoyed for years. As of February 1, our blog is…

6 Top Cybersecurity Conferences to Attend and Top Tips to Survive Travel in 2022

January 25th, 2022

Cybersecurity professionals began 2022 just like we started 2021, with many unknowns and travel disruptions. Events are once again being rescheduled, shifted to hybrid and online formats, or canceled. We must accept constant change, even as we plan our 2022 conference calendar. In 2022 I plan to do the things I need to do to…

7 Steps to Recognize and Combat Cyber Crime

January 4th, 2022

Recognizing and combating cyber crime This is one of the most talked-about topics in the media and in the boardroom in recent years. It is a major problem and challenge for many organizations. The average dwell-time (average time before a company detects a cyber breach) is more than 200 days, highlighting this as an area…

2022 Cyber Predictions: Ransomware, Hacking eSports, and COVID Cleanup

December 28th, 2021

In many ways, 2021 felt like an extra dose of 2020. Bright spots like COVID vaccines aside, most of us simply put our heads down and plowed ahead as the hits just kept coming. Responses to COVID accelerated digital transformation by as much as seven years, adding new tools and process automation to the security…

An Ethical Hacker’s Guide to IoT Security Risks and Challenges: Part 2

December 7th, 2021

This post is part of a series about IoT security risks and how you can minimize them. Read Part 1 here. Welcome to the second post in our series on the challenges associated with the Internet of Things (IoT).  In An Ethical Hacker's Guide to IoT Security Risks and Challenges: Part 1, we took an…