Centrify
![office building](https://img.helpnetsecurity.com/wp-content/uploads/2021/11/11142945/office_building_1200-400x200.jpg)
ThycoticCentrify renamed Delinea to help solve modern privileged access challenges
Delinea announced its debut as a leading provider of privileged access management (PAM) solutions for seamless security. Backed by TPG Capital, Delinea was formed in April …
![cloud complexity](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09102001/cloud-complexity-400x200.jpg)
Cybercriminals capitalizing on our reliance on the cloud
90% of cyberattacks on cloud environments in the last 12 months involved compromised privileged credentials, according to a research from Centrify. Most cloud environments …
![Palo Alto Networks](https://img.helpnetsecurity.com/wp-content/uploads/2020/06/30122417/palo_alto_networks-logo-400x200.jpg)
Critical flaw opens Palo Alto Networks firewalls and VPN appliances to attack, patch ASAP!
Palo Alto Networks has patched a critical and easily exploitable vulnerability (CVE-2020-2021) affecting PAN-OS, the custom operating system running on its next generation …
![](https://img.helpnetsecurity.com/wp-content/uploads/2020/02/28093729/rsac2020-26-400x200.jpg)
Photos: RSA Conference 2020, part 4
RSA Conference 2020 is underway at the Moscone Center in San Francisco. Check out our microsite for the conference for all the most important news. Here are a few photos from …
![business](https://img.helpnetsecurity.com/wp-content/uploads/2018/05/09101202/business-400x200.jpeg)
The leading challenge facing cloud migration projects is security
60% of organizations misunderstand the shared responsibility model for cloud security and incorrectly believe the cloud provider is responsible for securing privileged access, …
Howard Greenfield joins Centrify as Chief Revenue Officer
Centrify, a leading provider of cloud-ready Zero Trust Privilege to secure modern enterprises, announced that Howard Greenfield has joined the company as Chief Revenue Officer …
![circle](https://img.helpnetsecurity.com/wp-content/uploads/2018/09/09100231/circle-400x200.jpg)
New infosec products of the week: July 26, 2019
Centrify unveils free cloud-based PAM offering for organizations that do not have a password vault Centrify’s Free Tier Vault is available immediately in the AWS Marketplace, …
Centrify unveils free cloud-based PAM offering for organizations that do not have a password vault
Centrify, a leading provider of cloud-ready Zero Trust Privilege to secure modern enterprises, announced a free cloud-based Privileged Access Management (PAM) offering for the …
Centrify joins several working groups within the Identity Defined Security Alliance
Centrify, a leading provider of cloud-ready Zero Trust Privilege to secure modern enterprises, announced it has joined several working groups within the Identity Defined …
![Broken glass](https://img.helpnetsecurity.com/wp-content/uploads/2015/12/09195722/glass-262105_1920-400x200.jpg)
Security overconfidence and immaturity continue to endanger organizations
The majority of organizations are ill-prepared to protect themselves against privileged access abuse, the leading cyber-attack vector, according to Centrify and Techvangelism. …
![](https://img.helpnetsecurity.com/wp-content/uploads/2019/03/09094944/centrify-zero-trust-pam-400x200.jpg)
Centrify ushers in new era of privileged access management
Centrify, a leading provider of cloud-ready Zero Trust Privilege to secure modern enterprises, announced new cloud-ready solutions to help stop the leading cause of data …
![keys](https://img.helpnetsecurity.com/wp-content/uploads/2016/09/09110707/keys-400x200.jpg)
Privileged credential abuse is involved in 74% of data breaches
Most IT decision makers are not prioritizing Privileged Access Management (PAM) practices and solutions, despite knowing privileged credential abuse is involved in almost …
Featured news
Sponsored
Don't miss
- ChatGPTriage: How can CISOs see and control employees’ AI use?
- Managing exam pressure: Tips for certification preparation
- Firmware update hides Bluetooth fingerprints
- Critical Exim vulnerability facilitates malware delivery (CVE-2024-39929)
- Risk related to non-human identities: Believe the hype, reject the FUD