Phone Number +1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘For CISOs’

Introducing ThycoticCentrify: Integrating Two Identity Security Leaders

April 13th, 2021

By Art Gilliland and Jim Legg Today, we are pleased to share that Centrify and Thycotic have merged to become one. This follows on the previously-announced acquisitions of Centrify and Thycotic by TPG Capital. We are now able to embark on the process of integrating our businesses and solutions to better serve our customers and…


Thycotic Recognized for Industry Leading Customer Service in 2021 SC Awards

April 1st, 2021

We are pleased to announce that Thycotic has been selected as a finalist in the “Best Customer Service” category of the 2021 SC Awards. For the last 24 years, the prestigious SC Awards have recognized the people, organizations and products that are forging the cybersecurity industry’s future and advancing the cause of safe and secure commerce and…


Enterprise Trends That Will Define PAM Success in 2021

February 9th, 2021

The landscape of privileged accounts is becoming increasingly complex as organizations add new applications and change working styles in an ongoing COVID-19 world. Meanwhile, cyber criminals are only getting smarter. If you wait too long to plug your security gaps there’s a good chance they’ll find a way to exploit them. Forrester’s most recent Privileged…


Human Error and Implications in Information Security

February 2nd, 2021

Technologists, engineers, and future-focused organizations tout automation as the answer to consistency, reliability, and quality. Automation takes basic tasks out of human hands, freeing up human resources to focus on research, strategy, and planning. Even more, automated systems and services can work tirelessly around the clock. ITOps, DevOps, and SecOps leaders and architects are incredibly…


Enterprise Endpoint Management is a Must When All Users are Privileged Users

January 26th, 2021

A newly released eBook, The Definitive Guide to Endpoint Privilege Management (EPM), makes a strong case for why vulnerable endpoints must be secured from the perspective that all users are privileged users. In the guide’s Foreword, I emphasize that user identity has become the new “perimeter” of cyber security. That’s because a single compromised credential…


SolarWinds Sunburst: One of the Biggest Cyber Attacks Targeting the Software Industry Supply Chain in History

January 25th, 2021

Over the past weeks, we've learned more about one of the biggest cyber attack on the software industry supply chain.  This attack is a wake-up call for the software industry. It’s a true “mass indiscriminate global assault” as quoted by Brad Smith whom I regard as one of the most respected software leaders. His words…


Thycotic Named a 2021 Gartner Peer Insights Customers’ Choice for Privileged Access Management for Large Enterprise, Finance, and North America

January 21st, 2021

The Thycotic team is excited to announce that we have been recognized as a Customers’ Choice in the January 2021 Gartner Peer Insights ‘Voice of the Customer’: Privileged Access Management Markets Large Enterprise, Finance, and North America. Our team at Thycotic takes great pride in this distinction, as customer feedback continues to shape our products…


Top 5 Hacking and Cyber Security Books of 2020

January 19th, 2021

Continuous learning is a top priority for me.  It's critical to stay updated on the latest cyber security methods, technologies, strategies, and developments. 2020 brought the opportunity for us to indulge in some additional reading and learn new skills from incredible industry experts. From a young age, I struggled reading the likes of Shakespeare and…


What to Expect When Working with Thycotic Professional Services

January 12th, 2021

Thycotic customers come in all shapes, sizes, and levels of experience. Some are new to PAM. Perhaps they recently inherited the program. Or maybe they’re building a PAM strategy from scratch. Our pro services team supports them at every stage of their journey. Some want more hands-on control. They prefer writing their own scripts, building…


How Recent Analyst Research can Help You Find the Right PAM Vendor

November 19th, 2020

According to recent technology buying decision research sponsored by Thycotic, a significant number of executives, IT security and operations teams look primarily to the advice of independent analysts when evaluating a PAM or PIM solution that would work best for their organizations. That means independent analysis becomes very important in identifying vendors that belong on your…