Phone Number +1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Articles in the ‘Industry News’ Category

Black Hat USA 2021 – Top 5 Sessions to Attend & Tips to Survive Now that Conferences are Back In-Person

July 29th, 2021

It is that time of the year again—hacker summer camp is back! In 2020, the global pandemic dramatically changed our social environment, and both Black Hat and Defcon went virtual with in-person networking and parties placed on hold. This year, both events are back with a hybrid flavor to them. Black Hat USA, Saturday, July…


Day 90 Merger Update: Momentum During Integration Delivers a Great Q2 for ThycoticCentrify

July 22nd, 2021

Last week we passed the 90-day mark as we continue our integration journey as ThycoticCentrify. We also got a detailed look at our company performance during Q2. Across the board, it was clearly a hugely successful quarter for ThycoticCentrify. When you put the Thycotic and Centrify numbers together, it’s even more impressive and a powerful…


Thycotic and Centrify both named Leaders again in the 2021 Gartner Magic Quadrant for Privileged Access Management

July 21st, 2021

We’ve done it again! I’m very proud to share that both Thycotic and Centrify have again been recognized by Gartner as Leaders in the 2021 Gartner Magic Quadrant for Privileged Access Management (PAM). Evaluation by Gartner had already commenced before we announced the intent to combine as ThycoticCentrify in March 2021*. So this will be…


3 Top Takeaways from the 2021 Verizon Data Breach Investigations Report

June 29th, 2021

The 2021 Verizon Data Breach Investigations Report (DBIR) is here with the latest news and trends on the past year’s data breaches and security incidents. The Verizon DBIR is one of the industry’s top reports providing us with an indication of how well, or how poorly, our security efforts are performing, as well as giving…


New Ransomware Model Presumes Honor Among Thieves

May 20th, 2021

Ransomware is now big business, part of a production line of organized cyber crime. Thanks to ransomware’s new “affiliate” model, not only are attacks increasing in frequency, but they’re also becoming more sophisticated, successful, and damaging. This new affiliate model is also known as Ransomware-as-a-Service Ransomware attacks have victimized multiple organizations including TV stations, airplane…


30-Day Update on ThycoticCentrify Integration and Major Accomplishments

May 17th, 2021

It’s amazing to think that it’s only been 30 days since the announcement of the intended merger of Centrify and Thycotic. We are excited to share that we officially started the process of integrating these two privileged access management (PAM) leaders, and have already accomplished a lot in this short period of time. We remain…


Key Takeaways from the 2021 Cyberthreat Defense Report

April 27th, 2021

The recently released Cyberthreat Defense Report (CDR) 2021 from CyberEdge Group is packed with information about the rapidly evolving cyber security universe in the wake of a global pandemic.  Now in its eighth year, the 2021 CDR assessed the views of 1,200 IT security professionals representing 17 countries and 19 industries. It is one of…


Beyond Password Managers

March 16th, 2021

Passwords should be complex. Password management should be easy. Consumer password managers are popular solutions for personal password storage. These digital password vaults make it possible for people to have complex passwords for each website and application they use and help them avoid bad habits like writing passwords down or using the same password for…


Protecting IoT and Machine Identities (IDs) with Automated PAM Tools

March 11th, 2021

The most recent Forrester Wave for privileged identity management recognized that machine identities (IDs) are growing at twice the rate of human identities.  Much of this increase is due to the widespread adoption of Internet of Things (IoT) and automation through digital transformation initiatives that rely on cloud-based applications. The proliferation of connected devices and…


Can You Keep a Secret? Your Secrets Management System Can

March 4th, 2021

There are many different types of secrets in a digital enterprise. Secrets management requires broader and deeper security controls than traditional enterprise password management. It requires a coordinated process for managing all types of secrets in a centralized way to ensure systems and data remain secure. Secrets management keeps all secrets safe, prevents secret sprawl,…