Phone Number +1-202-802-9399 (US)

Thycotic’s Cyber Security Blog

FEATURED STORY:

The New Cyber Security “Perimeter”: Securing Privileged Access

Secure your vulnerable apps, devices, and cloud data through least privilege access

Cloud Tips

Filter by Tags: 

Interview: PAM Q&A with Dan Ritch

June 8th, 2021

It takes a village to develop ThycoticCentrify’s industry-leading Privileged Access Management solutions. I spoke with Dan Ritch, Senior Product Manager at ThycoticCentrify to discuss what it’s like to be a Product Manager at ThycoticCentrify and get his take on PAM for the cloud and how to drive adoption. What is your role at ThycoticCentrify? My…


Best Practices to Incorporate DevOps in Enterprise Security

June 1st, 2021

It’s impossible to make an organization 100% impenetrable. You may have all the right security policies and tools. But, no matter how quickly you shore up your defenses, cyber criminals just keep getting faster. To avoid becoming the next victim of a cyber attack, you just need to outrun the guy next to you. That’s…


Cyber Incident Response Checklist and Plan: Are You Breach-Ready?

May 27th, 2021

It’s no longer rare to see cyber-attacks in the daily news. From ransomware to data breaches to DDoS (Distributed Denial of Service) attacks, the incident is usually attributed to either cyber criminals or nation-states, and almost always comes from beyond our own country’s borders and laws. Because of this, we worry about clicking on a…


Azure Sentinel Now Integrates with Secret Server for Better Visibility and Faster Incidence Response

May 25th, 2021

Complex, dynamic organizations often have dozens of platforms to manage, each monitoring a different aspect of the security stack. Many Microsoft shops use Azure Sentinel as the single source of truth for security logging. Sentinel aggregates data from multiple security solutions and automates much of the noise away so that security teams can focus on…


New Ransomware Model Presumes Honor Among Thieves

May 20th, 2021

Ransomware is now big business, part of a production line of organized cyber crime. Thanks to ransomware’s new “affiliate” model, not only are attacks increasing in frequency, but they’re also becoming more sophisticated, successful, and damaging. This new affiliate model is also known as Ransomware-as-a-Service Ransomware attacks have victimized multiple organizations including TV stations, airplane…


Secrets Management, Reporting, and Encryption for Effective DevSecOps

May 18th, 2021

As more enterprises adopt DevSecOps, success stories keep piling up. The latest comes from CyberEdge Group in its 2021 Cyberthreat Defense Report. According to their survey of DevSecOps organizations: 45.8% deploy applications more quickly 47.2% deploy updates more quickly 38.5% reduce costs 38.3% reduce app security vulnerabilities What secrets do these organizations know that others…


30-Day Update on ThycoticCentrify Integration and Major Accomplishments

May 17th, 2021

It’s amazing to think that it’s only been 30 days since the announcement of the intended merger of Centrify and Thycotic. We are excited to share that we officially started the process of integrating these two privileged access management (PAM) leaders, and have already accomplished a lot in this short period of time. We remain…


Cloud Discovery: Find and Keep Track of Cloud Privileged Accounts

May 11th, 2021

One of the main advantages of using a cloud platform like AWS is that you don’t need to worry about maintenance and upgrades. Yet, cloud partnerships don’t absolve you of protecting sensitive information and processes. When you consider that Forrester Research found that 93% of enterprises are storing sensitive data in the cloud, you can…


Cyber Security Incident Reporting Process and Template

May 6th, 2021

Ever since we launched our customizable cyber security incident report template, I’ve been amazed by its volume of downloads. I quickly realized that the increasing cyber threats from criminal hackers, malware, and ransomware being taken seriously by organizations large and small, and that there is a growing demand for guidance and information on cyber security…


Privileged Access Management Analytics: Make Your Data Work for You

May 4th, 2021

When time is a resource you don’t have — you must make your data work for you. IT teams face an ever-evolving and expanding environment compounded by a shifting remote workforce, increase in BYOD policies, expansion of the attack surface, and pivot towards the cloud. Users and endpoints have left the office and are now…