Phone Number +1-202-802-9399 (US)

Thycotic is now Delinea!

Thycotic’s CyberSecurity Publication


Filter by Tags: 

Posts Tagged ‘For CISOs’

Findings from Delinea’s 2022 cyber insurance research report paint a troubling picture

November 10th, 2022

There were many findings in our recent research report on cyber security that weren’t a surprise. The survey confirmed what you’d expect: demand is high for cyber insurance policies and cyber insurance costs are rising. But other findings in the report caught me by surprise.

Robert Weed slashes time spent on PAM by 90% by transitioning to Secret Server

September 27th, 2022

Imagine walking into your new job as a CISO or head of IT operations. Your first order of business is to understand the risks your company faces. You’ve got to figure out which systems are critical, which security solutions are already in place, and where the gaps are. And you’ve got to do it fast. 

CISO Q&A with Delinea’s Stan Black

August 30th, 2022

As part of our interview series with Delinea’s leaders, we sat down with Stan Black, Chief Information Security Officer. Before joining Delinea, Stan was Chief Security and Intelligence Officer at Lattice Security, SVP, Chief Security Officer, and Chief Information Officer at Citrix. Prior to Citrix. Stan was Chief Security Officer at Nuance. He was also…

Key Takeaways from the Verizon Data Breach Investigations Report 2022

June 28th, 2022

Every year I anxiously await the publication of the Verizon Data Breach Investigations Report (DBIR). This annual tome is a virtual Mecca that draws a worldwide audience of security practitioners. We savor its insights and analysis of information security incidents and breaches. Heavy on data gleaned from actual investigations, it can be a little dry…

Cyber Insurance Case Studies: A Tale of Two Customers

May 17th, 2022

Delinea customers have been talking a lot about cyber insurance. Where to get it, what’s covered, and how to reduce their rates. We’ve been working with a variety of partners throughout the cyber insurance ecosystem to make sure our customers are well prepared to procure the right policy for them. Among Delinea customers, two recent…

6 Top Cybersecurity Conferences to Attend and Top Tips to Survive Travel in 2022

January 25th, 2022

Cybersecurity professionals began 2022 just like we started 2021, with many unknowns and travel disruptions. Events are once again being rescheduled, shifted to hybrid and online formats, or canceled. We must accept constant change, even as we plan our 2022 conference calendar. In 2022 I plan to do the things I need to do to…

Interview: CTO Q&A with David McNeely

December 21st, 2021

In any C-Suite role, governance is paramount. But a CTO needs to help drive value using technology to help it achieve its business objectives. To hear more about his role as CTO and his journey down the road of privileged access management, I was happy to chat with my long-time friend and colleague, David McNeely.…

An Ethical Hacker’s Guide to IoT Security Risks and Challenges: Part 2

December 7th, 2021

This post is part of a series about IoT security risks and how you can minimize them. Read Part 1 here. Welcome to the second post in our series on the challenges associated with the Internet of Things (IoT).  In An Ethical Hacker's Guide to IoT Security Risks and Challenges: Part 1, we took an…

Securing Secrets is Key to DevOps Innovation says New Forrester Survey Report

November 16th, 2021

A new survey and report from Forrester commissioned by ThycoticCentrify highlights what IT security and business leaders consider their biggest DevOps security challenges and what they want to see in solutions that will effectively resolve them. Solutions to what Forrester calls the DevOps “security innovation paradox” are critical for organizations, because sacrificing security in the…

PAM Pricing: The Real Cost of PAM Software

November 9th, 2021

A low price tag for PAM software doesn’t necessarily mean it’s the best overall value. Enterprise-scale PAM, like most software purchases, typically involves more than the initial license fee. Depending on your security goals, internal resources, and specific IT environment, you may need to plan for additional costs. It’s important to identify the total cost…