Phone Number +1-202-802-9399 (US)

ThycoticCentrify is now Delinea!   delinea.com

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘For CISOs’

30-Day Update on ThycoticCentrify Integration and Major Accomplishments

May 17th, 2021

It’s amazing to think that it’s only been 30 days since the announcement of the intended merger of Centrify and Thycotic. We are excited to share that we officially started the process of integrating these two privileged access management (PAM) leaders, and have already accomplished a lot in this short period of time. We remain…


Cyber Security Incident Reporting Process and Template

May 6th, 2021

Ever since we launched our customizable cyber security incident report template, I’ve been amazed by its volume of downloads. I quickly realized that the increasing cyber threats from criminal hackers, malware, and ransomware being taken seriously by organizations large and small, and that there is a growing demand for guidance and information on cyber security…


The New Cyber Security “Perimeter”: Securing Privileged Access

April 22nd, 2021

Because so many applications and services are now hosted in the cloud, the traditional cyber security perimeter no longer exists. Accelerated by the COVID global pandemic, remote access from multiple devices has become the rule rather than the exception across our networks. In our always-on, Internet-connected universe, every user potentially has access to privileged or…


Adoption Skyrockets with Invisible Privileged Access Management

April 20th, 2021

Traditional PAM solutions require users to interrupt their workflow to access privileged credentials. They must switch screens and switch contexts, slowing their productivity. Frustrated, busy users are more likely to skirt security policies when PAM is difficult to use. Privileged access management must be embedded in daily workflow To realize the benefits of enterprise PAM,…


Introducing ThycoticCentrify: Integrating Two Identity Security Leaders

April 13th, 2021

By Art Gilliland and Jim Legg Today, we are pleased to share that Centrify and Thycotic have merged to become one. This follows on the previously-announced acquisitions of Centrify and Thycotic by TPG Capital. We are now able to embark on the process of integrating our businesses and solutions to better serve our customers and…


Thycotic Recognized for Industry Leading Customer Service in 2021 SC Awards

April 1st, 2021

We are pleased to announce that Thycotic has been selected as a finalist in the “Best Customer Service” category of the 2021 SC Awards. For the last 24 years, the prestigious SC Awards have recognized the people, organizations and products that are forging the cybersecurity industry’s future and advancing the cause of safe and secure commerce and…


Enterprise Trends That Will Define PAM Success in 2021

February 9th, 2021

The landscape of privileged accounts is becoming increasingly complex as organizations add new applications and change working styles in an ongoing COVID-19 world. Meanwhile, cyber criminals are only getting smarter. If you wait too long to plug your security gaps there’s a good chance they’ll find a way to exploit them. Forrester’s most recent Privileged…


Human Error and Implications in Information Security

February 2nd, 2021

Technologists, engineers, and future-focused organizations tout automation as the answer to consistency, reliability, and quality. Automation takes basic tasks out of human hands, freeing up human resources to focus on research, strategy, and planning. Even more, automated systems and services can work tirelessly around the clock. ITOps, DevOps, and SecOps leaders and architects are incredibly…


Enterprise Endpoint Management is a Must When All Users are Privileged Users

January 26th, 2021

A newly released eBook, The Definitive Guide to Endpoint Privilege Management (EPM), makes a strong case for why vulnerable endpoints must be secured from the perspective that all users are privileged users. In the guide’s Foreword, I emphasize that user identity has become the new “perimeter” of cyber security. That’s because a single compromised credential…


SolarWinds Sunburst: One of the Biggest Cyber Attacks Targeting the Software Industry Supply Chain in History

January 25th, 2021

Over the past weeks, we've learned more about one of the biggest cyber attack on the software industry supply chain.  This attack is a wake-up call for the software industry. It’s a true “mass indiscriminate global assault” as quoted by Brad Smith whom I regard as one of the most respected software leaders. His words…