SecurityBrief Asia logo
Asia's leading source of cybersecurity and cyber-attack news

ThycoticCentrify news stories

Story image
Privileged Access Management / PAM
PAM security specialist ThycoticCentrify rebrands to Delinea
:We are providing privileged access without the excess," says Delinea CEO Art Gilliland.
Story image
Digital Transformation
ThycoticCentrify adds veteran leaders to international sales team
ThycoticCentrify has announced two new leaders to its international sales teams. 
Story image
Privileged Access Management / PAM
Thycotic named Gartner Peer Insights customers’ choice for Privileged Access Management
Centrify was also listed as an Established PAM provider based on user interest and adoption. 
Story image
Endpoint Protection
ThycoticCentrify adds new security controls and automation to Secret Server
"Our continued focus on decreasing the steps required to safeguard secrets reduces the workload on security administrators and the attack surface area."
Story image
DevOps
IT leaders need purpose-built PAM solutions, ThycoticCentrify finds
According to the ThycoticCentrify report, 76% of IAM leaders are looking for purpose-built PAM for DevOps solutions that would help development and security teams work better together.
Story image
Cybersecurity
ThycoticCentrify expands service account governance to multi-cloud environments
Cloud-based service accounts can easily become a security risk if not managed correctly and with the right tools.
Story image
Ransomware
Vale 2021, hello 2022: on the brink of full-out cyberwar
As organisations move to more strategic decision making and re-evaluate the risks of the difficult and unexpected accelerated transition, cyber threats have increased dramatically, and organisations are more exposed than ever.
Story image
DevOps
Organisations suffer security incidents related to exposed secrets in DevOps
Fifty-seven percent of organisations have suffered security incidents related to exposed secrets in DevOps, new research has revealed.
Story image
SaaS
ThycoticCentrify builds on vision for modern PAM with latest integration
ThycoticCentrify has leveraged the ThycoticCentrify platform to integrate with Secret Server, its privileged account and session management solution.
Story image
ThycoticCentrify
Zero Trust means strong, frictionless PAM and other controls
Imagine an organisation’s information infrastructure as something like a bank’s safe deposit box service, with security guards on the door.
Story image
Privileged Access Management / PAM
Be a “PAMbassador” and help your workmates be cyber smart
Right now, with the threat of ransomware and risks associated with hybrid working top of mind, there is no shortage of ways to put PAMbassadorial skills to good use!
Story image
Ransomware
Despite rising security budgets, businesses still paying ransom - report
The way cybercriminals use and manipulate ransomware in an effort to extract money from businesses has changed.
Story image
Privileged Access Management / PAM
Secure cloud migration with privileged access management
PAM can offer insight into risks that may be adjusted depending on the threat landscape, writes ThycoticCentrify chief security scientist Joseph Carson.
Story image
Privileged Access Management / PAM
ThycoticCentrify adds features to PAM solution
ThycoticCentrify has announced new features for its privileged access management solution, Thycotic Secret Server.
Story image
Cybersecurity
Risky business: Majority of workers take cybersecurity shortcuts despite knowing dangers
"Every organisation needs to establish security processes and work to ensure they resonate with employees."
Story image
Privileged Access Management / PAM
Thycotic and Centrify named as Leaders in Gartner MQ for Privileged Access Management
According to ThycoticCentrify CEO Art Gilliland, each company’s strengths noted in the report supports the position that the two companies work better together as one.
Story image
Privileged Access Management / PAM
Privileged access management vital as ransomware risks escalate
"PAM has become a key battleground in cyber security and the combined ThycoticCentrify is perfectly positioned to support our distribution channel partners and their customers."
Story image
ThycoticCentrify
ThycoticCentrify adds just-in-time workflows to Server Suite
The latest version of ThycoticCentrify's flagship PEDM solution now includes session audit data masking capabilities for UNIX, to reduce the risk of exposing potentially sensitive or highly restricted data.
Story image
ThycoticCentrify
ThycoticCentrify rolls out privileged management security features
ThycoticCentrify has added new privilege management security capabilities to Thycotic Privilege Manager and made additions to Thycotic Account Lifecycle Manager, its solution for service account governance.
Story image
Endpoint Protection
Rethinking endpoint management in the post-BYOD workplace
Endpoint protection has a reputation for “admin rights being ripped away” from end-users.
Story image
Privileged Access Management / PAM
ThycoticCentrify updates PAM capabilities across Secret Server & DevOps Secrets Vault
"To stay ahead of the threat curve, security and ITops teams are looking for ways to adopt and update security best practices, like PAM, in the most convenient way.”
Story image
Cybersecurity
Universities turn to privileged access management as they adopt Essential Eight cybersecurity strategies
The education sector continues to be a key target for a cyber attack.
Story image
Ransomware
Ransomware ravages Ireland's health service - experts comment
Ireland’s National Cyber Security Centre points to the ‘Conti’ ransomware variant, which caused the HSE's IT systems to shut down over the weekend.
Story image
Identity and Access Management
Uptick in cloud-based identity and access management in enterprises - survey
The popularity of cloud-based identity and access management (IAM) adoption in enterprises is on the rise.