PAM security specialist ThycoticCentrify rebrands to Delinea
:We are providing privileged access without the excess," says Delinea CEO Art Gilliland.
ThycoticCentrify adds veteran leaders to international sales team
ThycoticCentrify has announced two new leaders to its international sales teams.
Thycotic named Gartner Peer Insights customers’ choice for Privileged Access Management
Centrify was also listed as an Established PAM provider based on user interest and adoption.
ThycoticCentrify adds new security controls and automation to Secret Server
"Our continued focus on decreasing the steps required to safeguard secrets reduces the workload on security administrators and the attack surface area."
IT leaders need purpose-built PAM solutions, ThycoticCentrify finds
According to the ThycoticCentrify report, 76% of IAM leaders are looking for purpose-built PAM for DevOps solutions that would help development and security teams work better together.
ThycoticCentrify expands service account governance to multi-cloud environments
Cloud-based service accounts can easily become a security risk if not managed correctly and with the right tools.
Vale 2021, hello 2022: on the brink of full-out cyberwar
As organisations move to more strategic decision making and re-evaluate the risks of the difficult and unexpected accelerated transition, cyber threats have increased dramatically, and organisations are more exposed than ever.
Organisations suffer security incidents related to exposed secrets in DevOps
Fifty-seven percent of organisations have suffered security incidents related to exposed secrets in DevOps, new research has revealed.
Zero Trust means strong, frictionless PAM and other controls
Imagine an organisation’s information infrastructure as something like a bank’s safe deposit box service, with security guards on the door.
ThycoticCentrify builds on vision for modern PAM with latest integration
ThycoticCentrify has leveraged the ThycoticCentrify platform to integrate with Secret Server, its privileged account and session management solution.
Be a “PAMbassador” and help your workmates be cyber smart
Right now, with the threat of ransomware and risks associated with hybrid working top of mind, there is no shortage of ways to put PAMbassadorial skills to good use!
Despite rising security budgets, businesses still paying ransom - report
The way cybercriminals use and manipulate ransomware in an effort to extract money from businesses has changed.
Secure cloud migration with privileged access management
PAM can offer insight into risks that may be adjusted depending on the threat landscape, writes ThycoticCentrify chief security scientist Joseph Carson.
ThycoticCentrify adds features to PAM solution
ThycoticCentrify has announced new features for its privileged access management solution, Thycotic Secret Server.
Risky business: Majority of workers take cybersecurity shortcuts despite knowing dangers
"Every organisation needs to establish security processes and work to ensure they resonate with employees."
Thycotic and Centrify named as Leaders in Gartner MQ for Privileged Access Management
According to ThycoticCentrify CEO Art Gilliland, each company’s strengths noted in the report supports the position that the two companies work better together as one.
Privileged access management vital as ransomware risks escalate
"PAM has become a key battleground in cyber security and the combined ThycoticCentrify is perfectly positioned to support our distribution channel partners and their customers."
ThycoticCentrify adds just-in-time workflows to Server Suite
The latest version of ThycoticCentrify's flagship PEDM solution now includes session audit data masking capabilities for UNIX, to reduce the risk of exposing potentially sensitive or highly restricted data.
ThycoticCentrify rolls out privileged management security features
ThycoticCentrify has added new privilege management security capabilities to Thycotic Privilege Manager and made additions to Thycotic Account Lifecycle Manager, its solution for service account governance.
Rethinking endpoint management in the post-BYOD workplace
Endpoint protection has a reputation for “admin rights being ripped away” from end-users.
ThycoticCentrify updates PAM capabilities across Secret Server & DevOps Secrets Vault
"To stay ahead of the threat curve, security and ITops teams are looking for ways to adopt and update security best practices, like PAM, in the most convenient way.”
Universities turn to privileged access management as they adopt Essential Eight cybersecurity strategies
The education sector continues to be a key target for a cyber attack.
Ransomware ravages Ireland's health service - experts comment
Ireland’s National Cyber Security Centre points to the ‘Conti’ ransomware variant, which caused the HSE's IT systems to shut down over the weekend.
Uptick in cloud-based identity and access management in enterprises - survey
The popularity of cloud-based identity and access management (IAM) adoption in enterprises is on the rise.