ThycoticCentrify renamed Delinea to help solve modern privileged access challenges

Delinea announced its debut as a leading provider of privileged access management (PAM) solutions for seamless security. Backed by TPG Capital, Delinea was formed in April 2021 through the merger of established PAM leaders Thycotic and Centrify. Deline… Continue reading ThycoticCentrify renamed Delinea to help solve modern privileged access challenges

TPG-Led Investor Group Announces Combination of Thycotic and Centrify to Create a Leading Cloud Identity Security Vendor

Combination will create a Best-In-Class SaaS Platform to Better Serve the Rapidly Growing Demand for Privileged Access Management (PAM) Software as Cyber-Attacks Increase Transaction Follows Closing of TPG’s Previously Announced Acquisition of Centrify… Continue reading TPG-Led Investor Group Announces Combination of Thycotic and Centrify to Create a Leading Cloud Identity Security Vendor

85% of organizations fail to meet even basic PAM security hygiene

While nearly four out of five organizations (78 percent) now include privileged credential protection as part of their cybersecurity policies, their privileged access management (PAM) security practices are woefully lacking and even worse than you migh… Continue reading 85% of organizations fail to meet even basic PAM security hygiene

Is Privileged Access Management still a pain?

Every week seems to bring the story of a new customer data breach, but regardless of the individual details, the majority of incidents have one trait in common. The chances are high that the breach was made possible through the compromise of privileged… Continue reading Is Privileged Access Management still a pain?

Industry reactions to the enormous Marriott data breach

On September 8, 2018, Marriott received an alert from an internal security tool regarding an attempt to access the Starwood guest reservation database in the United States. Marriott engaged security experts to help determine what occurred. Marriott lea… Continue reading Industry reactions to the enormous Marriott data breach

Why we need to bridge the gap between IT operations and IT security

Thycotic released the findings from its 2018 VMworld survey of more than 250 IT operations professionals which looked into their experiences in using cybersecurity tools on a daily basis, including their concerns and preferences. According to the findi… Continue reading Why we need to bridge the gap between IT operations and IT security

New Spectre-like flaw found in CPUs using speculative execution

A new flaw that can allow an attacker to obtain access to sensitive information on affected systems has been discovered in modern CPUs. CVE-2018-3639, discovered by independently by Google Project Zero and Microsoft Security Response Center researchers… Continue reading New Spectre-like flaw found in CPUs using speculative execution

ServiceNow, Gurucul Fraud, and Shadow Devices – Enterprise Security Weekly #91

ServiceNow introduces virtual agent, Red Hat to integrate CoreOS with OpenShift, Thycotic announces IBM Security, and Gurucul Fraud Analytics Solution monitors users. Enterprise News ServiceNow Introduces Virtual Agent How to Install and Configure the … Continue reading ServiceNow, Gurucul Fraud, and Shadow Devices – Enterprise Security Weekly #91

New infosec products of the week​: January 19, 2018

Continuous vulnerability management for ICS cybersecurity PAS Cyber Integrity 6.0 now includes continuous vulnerability management providing visibility into vulnerability risk within industrial process control networks. Cyber Integrity moves beyond tra… Continue reading New infosec products of the week​: January 19, 2018