
Delinea customers have been talking a lot about cyber insurance. Where to get it, what’s covered, and how to reduce their rates. We’ve been working with a variety of partners throughout the cyber insurance ecosystem to make sure our customers are well prepared to procure the right policy for them. Among Delinea customers, two recent…
Two of the most important things we can do is learn and stay connected. I stay updated on the latest trends in cybersecurity by listening to the top cybersecurity podcasts. Each of the podcasts I have selected for this post has different values. From technical information, latest news and trends, and details on security incidents,…
In this conversation, we hear from Chris Smith, Chief Marketing Officer of Delinea, about the company’s recent rebranding, how marketing and IT can partner effectively, and the challenges of a changing privileged access management (PAM) industry. Chris shares a behind-the-scenes perspective on bringing Thycotic and Centrify together and insights into what customers can expect from…
The stability of the world has significantly eroded in the past few weeks with the catastrophic war that has caused devastation and a humanitarian crisis in Ukraine … As the war on the ground continues to escalate, the information war is also intensifying. The battle rages between truth and propaganda, with cyberattacks as powerful weapons.
A new arm of the insurance industry is emerging to help your business mitigate risk: cybersecurity insurance. Cyber insurance offers a safety net for businesses threatened by the rapid growth of insider cyber crime and external cyber threats, particularly ransomware. While cyber insurance has been a reliable safety net for years—things are changing fast.
We are excited to share that, after the merger of Thycotic and Centrify in April 2021, we have officially emerged as Delinea, the leading provider of privileged access management (PAM) solutions for seamless security! That doesn’t mean you won’t get that same great content you have enjoyed for years. As of February 1, our blog is…
Cybersecurity professionals began 2022 just like we started 2021, with many unknowns and travel disruptions. Events are once again being rescheduled, shifted to hybrid and online formats, or canceled. We must accept constant change, even as we plan our 2022 conference calendar. In 2022 I plan to do the things I need to do to…
Recognizing and combating cyber crime This is one of the most talked-about topics in the media and in the boardroom in recent years. It is a major problem and challenge for many organizations. The average dwell-time (average time before a company detects a cyber breach) is more than 200 days, highlighting this as an area…
In many ways, 2021 felt like an extra dose of 2020. Bright spots like COVID vaccines aside, most of us simply put our heads down and plowed ahead as the hits just kept coming. Responses to COVID accelerated digital transformation by as much as seven years, adding new tools and process automation to the security…
This post is part of a series about IoT security risks and how you can minimize them. Read Part 1 here. Welcome to the second post in our series on the challenges associated with the Internet of Things (IoT). In An Ethical Hacker's Guide to IoT Security Risks and Challenges: Part 1, we took an…