Phone Number +1-202-802-9399 (US)

Thycotic is now Delinea!

Thycotic’s CyberSecurity Publication


Filter by Tags: 

Posts Tagged ‘PAM Advanced’

Secret Server releases updates to increase resiliency and security

October 25th, 2022

We all know that cybersecurity is more important than ever. Let’s go over the facts: data breaches are getting worse every year cybercriminals are becoming more sophisticated breaches are costing companies millions of dollars attack surfaces are expanding organizations have more identities to manage than ever before company leaders are in the hot seat, which…

Protect Active Directory from cyberattacks with Server PAM

October 4th, 2022

A cyberattacker just breached your Microsoft Azure Active Directory. Is it game over? Not if you have the right privileged access controls in place. Microsoft Azure Active Directory (AD) is a high-value target for cybercriminals to attain their nefarious goals. Many organizations still rely on on-premise AD, but the adoption of Microsoft’s cloud-based Azure AD…

Extended PAM (XPM): Intelligent automation for risk-based, adaptive privilege

September 15th, 2022

Why privileged access management must be extended In my previous blog, Extended PAM for integrated, multi-layered cyber defenses, I explored the reasons why we at Delinea believe that Privilege is the future of cybersecurity. Over the course of my career in cybersecurity, I’ve seen the rise of many promising solutions, but at the end of…

Privilege Escalation on Linux: When it’s good and when it’s a disaster (with examples)

August 4th, 2022

For authorized users on Linux, privilege escalation allows elevated access to complete a specific task or make system configuration modifications. For example, system administrators may need access to troubleshoot a technical problem, add a user, make configuration changes to an application, or install a program.

Extended PAM for integrated, multi-layered cyber defenses

July 28th, 2022

Increasing IT complexity and an endless array of IAM and cybersecurity tools make it challenging to combat privileged account attacks effectively. As a PAM industry leader, Delinea is creating a future in which you can understand, manage, and defend your entire privileged attack surface from a single solution across both traditional and emerging use cases.…

Delinea Named a Leader Again in the 2022 Gartner® Magic Quadrant™ for Privileged Access Management

July 22nd, 2022

I’m very proud to share that Delinea has been named a Leader in the 2022 Gartner Magic Quadrant for Privileged Access Management (PAM). Download the Report:

Privileged Account Security Simplified | Free eBook

July 19th, 2022

The classic cybersecurity perimeter no longer exists. Today’s cybersecurity is a race against cybercriminals and their expanding networks that have become big business. Ransomware, malware, exploits, and social engineering techniques are constantly evolving, and damages to cybercrime victims are drastically increasing.

Securing Active Directory to Reduce Ransomware Attacks: A Quick Primer

July 12th, 2022

Ransomware attacks are increasing in size and complexity, putting organizations across all industries at risk for account lockouts, extortion attempts, and data loss. In fact, the latest research indicates ransomware attacks are up by 80% year-over-year. In large part, this is because most ransomware families—the code signatures and malicious commands that carry out ransomware attacks—are now…

Secure Remote Access Paradigms Pros and Cons

June 14th, 2022

Remote users expect instant connectivity so they can access the same systems they use when in the office. However, increasingly complex hybrid cloud, multi-cloud, and on-premise infrastructures make remote privileged access more difficult for IT teams to manage and secure using traditional access management techniques. Therefore, enterprises need a flexible, easy-to-use method for secure remote…

Improve cyber resilience and speed disaster recovery with the latest version of Secret Server

June 7th, 2022

Disaster can come in many forms. A ransomware attack. A malicious insider. Or, a natural disaster. Any of these can cause a widespread system or network outage that prevents critical access to systems. When disaster strikes, it’s critical to recover quickly. The problem is that most businesses aren’t ready to respond to an unplanned outage.