Phone Number +1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘Cyber Security Hot Topics’

Day 90 Merger Update: Momentum During Integration Delivers a Great Q2 for ThycoticCentrify

July 22nd, 2021

Last week we passed the 90-day mark as we continue our integration journey as ThycoticCentrify. We also got a detailed look at our company performance during Q2. Across the board, it was clearly a hugely successful quarter for ThycoticCentrify. When you put the Thycotic and Centrify numbers together, it’s even more impressive and a powerful…


How to Vacation Safely, Without Increasing Your Cyber Security Risk

July 6th, 2021

The combination of pandemic lockdowns and remote work has led to a stockpile of unspent PTO. With vaccination rates increasing and travel restrictions lifting, people are starting to use their vacation days in droves. But that doesn’t mean hackers -- or their bots -- are taking time off.  (Side note: Criminal hackers really should take time off. They’ve been working…


3 Top Takeaways from the 2021 Verizon Data Breach Investigations Report

June 29th, 2021

The 2021 Verizon Data Breach Investigations Report (DBIR) is here with the latest news and trends on the past year’s data breaches and security incidents. The Verizon DBIR is one of the industry’s top reports providing us with an indication of how well, or how poorly, our security efforts are performing, as well as giving…


ThycoticCentrify Day 60 Update: Customer Excitement, Innovation During Integration

June 17th, 2021

We’ve just completed Day 60 of our integration as ThycoticCentrify. I’m very excited about everything that our team has accomplished, how these two PAM industry leaders are coming together, and the positive feedback we’re hearing from customers. CUSTOMER EXCITEMENT Over the past 4+ months I’ve been able to engage with many Centrify and Thycotic customers,…


Cyber Incident Response Checklist and Plan: Are You Breach-Ready?

May 27th, 2021

It’s no longer rare to see cyber-attacks in the daily news. From ransomware to data breaches to DDoS (Distributed Denial of Service) attacks, the incident is usually attributed to either cyber criminals or nation-states, and almost always comes from beyond our own country’s borders and laws. Because of this, we worry about clicking on a…


New Ransomware Model Presumes Honor Among Thieves

May 20th, 2021

Ransomware is now big business, part of a production line of organized cyber crime. Thanks to ransomware’s new “affiliate” model, not only are attacks increasing in frequency, but they’re also becoming more sophisticated, successful, and damaging. This new affiliate model is also known as Ransomware-as-a-Service Ransomware attacks have victimized multiple organizations including TV stations, airplane…


30-Day Update on ThycoticCentrify Integration and Major Accomplishments

May 17th, 2021

It’s amazing to think that it’s only been 30 days since the announcement of the intended merger of Centrify and Thycotic. We are excited to share that we officially started the process of integrating these two privileged access management (PAM) leaders, and have already accomplished a lot in this short period of time. We remain…


Key Takeaways from the 2021 Cyberthreat Defense Report

April 27th, 2021

The recently released Cyberthreat Defense Report (CDR) 2021 from CyberEdge Group is packed with information about the rapidly evolving cyber security universe in the wake of a global pandemic.  Now in its eighth year, the 2021 CDR assessed the views of 1,200 IT security professionals representing 17 countries and 19 industries. It is one of…


Introducing ThycoticCentrify: Integrating Two Identity Security Leaders

April 13th, 2021

By Art Gilliland and Jim Legg Today, we are pleased to share that Centrify and Thycotic have merged to become one. This follows on the previously-announced acquisitions of Centrify and Thycotic by TPG Capital. We are now able to embark on the process of integrating our businesses and solutions to better serve our customers and…


Privileged Identity Management (PIM) and Identity-Centric Security Controls

April 1st, 2021

The number of identities in the enterprise is exploding. Gaining control of identities related to people as well as machines is a challenge for many organizations. You need to know who your users are and what they do. If you experience a security incident, you must be able to reverse engineer who did what in…