Black Hat USA 2021 – Top 5 Sessions to Attend & Tips to Survive Now that Conferences are Back In-Person

It is that time of the year again—hacker summer camp is back! In 2020, the global pandemic dramatically changed our social environment, and both Black Hat and Defcon went virtual with in-person networking and parties placed on hold. This year, bo… Continue reading Black Hat USA 2021 – Top 5 Sessions to Attend & Tips to Survive Now that Conferences are Back In-Person

Cyber Security Wakeup Call: New Global Research Shows Remote Workers Face Tough Choices Between Productivity and Security

ThycoticCentrify just completed a global cyber security survey among 8,000+ knowledge workers in 15 countries in partnership with Sapio Research. Survey results reveal a disturbing (if not surprising) disconnect between an understanding of cyber … Continue reading Cyber Security Wakeup Call: New Global Research Shows Remote Workers Face Tough Choices Between Productivity and Security

Introducing ThycoticCentrify: Integrating Two Identity Security Leaders

By Art Gilliland and Jim Legg
Today, we are pleased to share that Centrify and Thycotic have merged to become one. This follows on the previously-announced acquisitions of Centrify and Thycotic by TPG Capital. We are now able to embark on the pro… Continue reading Introducing ThycoticCentrify: Integrating Two Identity Security Leaders

The CISO Research Report: CISOs thrive on being Guardians of the Business and maybe even the Galaxy

Is Data the new Oil? Some people maintain that “Data is the new oil”. Tech companies around the world are now ranking among the largest global companies. A number of them have values that exceed some countries’ GDP.  Tesla, some would… Continue reading The CISO Research Report: CISOs thrive on being Guardians of the Business and maybe even the Galaxy

8 Signs you’re outgrowing your PAM System and what to do next

Growth is a great problem to have. Suddenly you’re onboarding lots of people, launching products and signing off on new projects. It can also be stressful. Your company is looking to you to keep IT systems running smoothly and securely.  As your compan… Continue reading 8 Signs you’re outgrowing your PAM System and what to do next

The robots are here. Actually, they’ve been here for a while

Every team across your organization is looking for ways to free up more time. In the past year, Robotic Process Automation (RPA) has exploded as a new way to remove tedious, repetitive tasks from the shoulders of humans and give them to—you guessed it—… Continue reading The robots are here. Actually, they’ve been here for a while

Why are security and business goals at odds with each other?

Few jobs are more challenging than that of a CISO. Constantly on call and under intense pressure, they’re not only keeping critical systems running and sensitive data protected, but also working to uphold a rapidly evolving list of regulatory demands. … Continue reading Why are security and business goals at odds with each other?

Top 10 Best Cyber Security Podcasts of 2019

Podcasts have transformed the way we digest news, learn on the go, and optimize our commutes. With podcasts gaining popularity due to their ability to fit into our busy lives, a wave of new cyber security experts have launched a series of IT podcasts t… Continue reading Top 10 Best Cyber Security Podcasts of 2019

The Evolution from Password Managers to Privileged Access Management. Which is right for you?

In recent years the need for improved Identity and Access Management (IAM) has been growing. Businesses are enabling policies and technologies to authorize approved employees and 3rd party contractors’ access to the systems and applications required to… Continue reading The Evolution from Password Managers to Privileged Access Management. Which is right for you?

Design Principles that Drive Thycotic’s Software User Experience Strategy

Users are the biggest risk to information security. That’s why it’s so important to have a usable software product, especially in the cyber security space. Our goal is to give people the agility and control they need to reduce risk. Usability is our No… Continue reading Design Principles that Drive Thycotic’s Software User Experience Strategy