David McNeely

Interview: CTO Q&A with David McNeely

In any C-Suite role, governance is paramount. But a CTO needs to help drive value using technology to help it achieve its business objectives. To hear more about his role as CTO and his journey down the road of privileged access management, I was happy to chat with my long-time ... Read More

Smarter, More Modern PAM: Secret Server Integration with the Platform Plus Cloud Suite Enhancements

ThycoticCentrify’s latest release evolves our Privileged Access Management (PAM) solutions along two critical strategic paths. Firstly, we’re blending Thycotic and Centrify PAM products, so you benefit from the very best PAM capabilities from two of the industry’s market leaders. As an example, existing Secret Server customers will now be able ... Read More
Apply Zero Trust Principle to PAM | Chart

Zero Trust Privilege for PAM Dummies eBook

Security is Broken. Long Live Security. At ThycoticCentrify, cyber security is our bag. We’ve blogged about how identity-based breaches are on the rise, fueled by a perfect storm of conditions that include cloud transformation, an expanding attack surface, and wholesale remote VPN-based access due to the increase in work from ... Read More