Phone Number +1-202-802-9399 (US)

ThycoticCentrify is now Delinea!   delinea.com

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘For CISOs’

Key Takeaways from the Verizon Data Breach Investigations Report 2022

June 28th, 2022

Every year I anxiously await the publication of the Verizon Data Breach Investigations Report (DBIR). This annual tome is a virtual Mecca that draws a worldwide audience of security practitioners. We savor its insights and analysis of information security incidents and breaches. Heavy on data gleaned from actual investigations, it can be a little dry…


Cyber Insurance Case Studies: A Tale of Two Customers

May 17th, 2022

Delinea customers have been talking a lot about cyber insurance. Where to get it, what’s covered, and how to reduce their rates. We’ve been working with a variety of partners throughout the cyber insurance ecosystem to make sure our customers are well prepared to procure the right policy for them. Among Delinea customers, two recent…


6 Top Cybersecurity Conferences to Attend and Top Tips to Survive Travel in 2022

January 25th, 2022

Cybersecurity professionals began 2022 just like we started 2021, with many unknowns and travel disruptions. Events are once again being rescheduled, shifted to hybrid and online formats, or canceled. We must accept constant change, even as we plan our 2022 conference calendar. In 2022 I plan to do the things I need to do to…


Interview: CTO Q&A with David McNeely

December 21st, 2021

In any C-Suite role, governance is paramount. But a CTO needs to help drive value using technology to help it achieve its business objectives. To hear more about his role as CTO and his journey down the road of privileged access management, I was happy to chat with my long-time friend and colleague, David McNeely.…


An Ethical Hacker’s Guide to IoT Security Risks and Challenges: Part 2

December 7th, 2021

This post is part of a series about IoT security risks and how you can minimize them. Read Part 1 here. Welcome to the second post in our series on the challenges associated with the Internet of Things (IoT).  In An Ethical Hacker's Guide to IoT Security Risks and Challenges: Part 1, we took an…


Securing Secrets is Key to DevOps Innovation says New Forrester Survey Report

November 16th, 2021

A new survey and report from Forrester commissioned by ThycoticCentrify highlights what IT security and business leaders consider their biggest DevOps security challenges and what they want to see in solutions that will effectively resolve them. Solutions to what Forrester calls the DevOps “security innovation paradox” are critical for organizations, because sacrificing security in the…


PAM Pricing: The Real Cost of PAM Software

November 9th, 2021

A low price tag for PAM software doesn’t necessarily mean it’s the best overall value. Enterprise-scale PAM, like most software purchases, typically involves more than the initial license fee. Depending on your security goals, internal resources, and specific IT environment, you may need to plan for additional costs. It’s important to identify the total cost…


Limit Privileged Access for Third-Party Vendors Without Restricting their Ability to Get Work Done

October 12th, 2021

Companies often work with outside experts, consultants, and other third-party vendors who need privileged access to corporate resources. You may be engaging with third-party vendors in a number of different ways, such as a remote contractor working on a time-limited project, an embedded contractor, or outsourced staff augmentation. These third-party entities can’t do what they…


Zero Trust for ICS/SCADA Systems

September 14th, 2021

Society today is heavily dependent on critical infrastructure that mostly works behind the scenes such as power stations, oil refineries, agriculture operations, mining, water treatment, green energy, transportation, and manufacturing operations. These systems help deliver electricity to power our homes, recharge our phones and vehicles, deliver goods using just-in-time (JIT) manufacturing processes or simply provide…


Thycotic and Centrify Recognized Again as Leaders in New 2021 KuppingerCole Leadership Compass for PAM

September 1st, 2021

As we announced our merger in March and began our integration, Thycotic and Centrify were in the process of being evaluated separately by KuppingerCole for its 2021 Leadership Compass for Privileged Access Management (PAM). Not surprisingly, both Thycotic and Centrify were named Overall Leaders again, as well as earning leadership positions in the major categories…