Phone Number +1-202-802-9399 (US)

Thycotic is now Delinea!   delinea.com

Thycotic’s CyberSecurity Publication

[popular_categories]

Filter by Tags: 

Posts Tagged ‘PAM Basics’

Robert Weed slashes time spent on PAM by 90% by transitioning to Secret Server

September 27th, 2022

Imagine walking into your new job as a CISO or head of IT operations. Your first order of business is to understand the risks your company faces. You’ve got to figure out which systems are critical, which security solutions are already in place, and where the gaps are. And you’ve got to do it fast. 


Passwordless authentication: making the vision a reality

July 5th, 2022

The concept of passwordless authentication has been getting a lot of hype. And for good reason. The human element accounts for most data breaches, with 82% stemming from stolen passwords, phishing, misuse, and errors. The idea that users wouldn’t need to create and remember complex passwords, store them in a password vault, or regularly change…


Breaking the Glass With Unlimited Administration Mode

January 14th, 2022

What happens when a user creates secrets and does not share them with anyone else, or if you are administrating Secret Server and need to re-organize your secrets? Secret Server’s “break the glass” feature, Unlimited Administration Mode, can help in those situations. The Unlimited Administrator Mode allows designated users to manage Secrets they would normally…


7 Steps to Recognize and Combat Cyber Crime

January 4th, 2022

Recognizing and combating cyber crime This is one of the most talked-about topics in the media and in the boardroom in recent years. It is a major problem and challenge for many organizations. The average dwell-time (average time before a company detects a cyber breach) is more than 200 days, highlighting this as an area…


The 7 Deadly Privileged Accounts You MUST Discover, Manage, and Secure

December 14th, 2021

Privileged accounts and privileged access are at the heart of every business today. They ensure that the IT team can administer and manage the organization’s systems, infrastructure, and software, and they enable employees to access the data that enables them to make critical business decisions. Not only are most businesses dependent on privileged accounts, but they…


Back to Basics: Service Account Management 101

November 23rd, 2021

Service accounts don’t have to be a nightmare. Get them under control now. Service accounts are typically used in operating systems to execute applications or run programs, either in the context of system accounts (high privileged accounts without any password) or a specific user account, usually created manually or during software installation.  On Unix and…


The Password Spreadsheet: Why NOT to store your passwords in Excel

October 14th, 2021

Is your organization still using an Excel password spreadsheet to store and manage sensitive passwords—the keys to your kingdom? You’re not alone. But storing privileged account passwords and credentials in an Excel spreadsheet poses a serious security risk. Excel was never intended to be a password manager, so there’s no chance it’s ever going to…


Privileged Password Management 101: What exactly is PPM?

October 5th, 2021

Let’s reduce password pain and move passwords into the background Passwords remain one of the top challenges and causes of cyber fatigue for employees. As we move more of our business and lives online this means the number of credentials needed to protect our identities continues to grow. Unfortunately, a single password is sometimes the…


Interview: PAM Product Q&A with Richard Wang

September 28th, 2021

It takes a village to develop ThycoticCentrify’s industry-leading Privileged Access Management solutions. I spoke with Richard Wang, Senior Director of Product Management at ThycoticCentrify to discuss what it’s like to lead the product team, how we develop our product roadmap, and advice for those starting and continuing along their PAM journey. Sara: Hi Richard, thank…


What Small Businesses Need to Know About Cyber Security and Password Management

September 7th, 2021

Small to medium businesses (SMBs) made tough choices this past year to keep their business running. Staff scattered to work from home—unexpectedly—and SMBs had to quickly enable them with tools and support to stay connected. Many small companies were forced to sacrifice cyber security best practices in favor of business productivity, increasing their risk of…