Phone Number +1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘For CISOs’

Interview: CTO Q&A with David McNeely

December 21st, 2021

In any C-Suite role, governance is paramount. But a CTO needs to help drive value using technology to help it achieve its business objectives. To hear more about his role as CTO and his journey down the road of privileged access management, I was happy to chat with my long-time friend and colleague, David McNeely.…


An Ethical Hacker’s Guide to IoT Security Risks and Challenges: Part 2

December 7th, 2021

This post is part of a series about IoT security risks and how you can minimize them. Read Part 1 here. Welcome to the second post in our series on the challenges associated with the Internet of Things (IoT).  In An Ethical Hacker's Guide to IoT Security Risks and Challenges: Part 1, we took an…


Securing Secrets is Key to DevOps Innovation says New Forrester Survey Report

November 16th, 2021

A new survey and report from Forrester commissioned by ThycoticCentrify highlights what IT security and business leaders consider their biggest DevOps security challenges and what they want to see in solutions that will effectively resolve them. Solutions to what Forrester calls the DevOps “security innovation paradox” are critical for organizations, because sacrificing security in the…


PAM Pricing: The Real Cost of PAM Software

November 9th, 2021

A low price tag for PAM software doesn’t necessarily mean it’s the best overall value. Enterprise-scale PAM, like most software purchases, typically involves more than the initial license fee. Depending on your security goals, internal resources, and specific IT environment, you may need to plan for additional costs. It’s important to identify the total cost…


Limit Privileged Access for Third-Party Vendors Without Restricting their Ability to Get Work Done

October 12th, 2021

Companies often work with outside experts, consultants, and other third-party vendors who need privileged access to corporate resources. You may be engaging with third-party vendors in a number of different ways, such as a remote contractor working on a time-limited project, an embedded contractor, or outsourced staff augmentation. These third-party entities can’t do what they…


Zero Trust for ICS/SCADA Systems

September 14th, 2021

Society today is heavily dependent on critical infrastructure that mostly works behind the scenes such as power stations, oil refineries, agriculture operations, mining, water treatment, green energy, transportation, and manufacturing operations. These systems help deliver electricity to power our homes, recharge our phones and vehicles, deliver goods using just-in-time (JIT) manufacturing processes or simply provide…


Thycotic and Centrify Recognized Again as Leaders in New 2021 KuppingerCole Leadership Compass for PAM

September 1st, 2021

As we announced our merger in March and began our integration, Thycotic and Centrify were in the process of being evaluated separately by KuppingerCole for its 2021 Leadership Compass for Privileged Access Management (PAM). Not surprisingly, both Thycotic and Centrify were named Overall Leaders again, as well as earning leadership positions in the major categories…


Approval Workflows and Notifications for Busy People

August 31st, 2021

Maybe it's happened to you. You deleted a service account because it didn’t seem like any processes were tied to it. And then something broke. Privilege management mistakes happen—but they don’t have to. Setting up an end-to-end workflow for privileged account governance decreases the risk of mistakenly pulling the plug on an important process. The…


Black Hat USA 2021 – Top 5 Sessions to Attend & Tips to Survive Now that Conferences are Back In-Person

July 29th, 2021

It is that time of the year again—hacker summer camp is back! In 2020, the global pandemic dramatically changed our social environment, and both Black Hat and Defcon went virtual with in-person networking and parties placed on hold. This year, both events are back with a hybrid flavor to them. Black Hat USA, Saturday, July…


Cyber Security Wakeup Call: New Global Research Shows Remote Workers Face Tough Choices Between Productivity and Security

July 27th, 2021

ThycoticCentrify just completed a global cyber security survey among 8,000+ knowledge workers in 15 countries in partnership with Sapio Research. Survey results reveal a disturbing (if not surprising) disconnect between an understanding of cyber security risks in 2021 and the risky activities employees engage in every day to get their jobs done. This new survey…