Phone Number +1-202-802-9399 (US)

Thycotic’s Cyber Security Blog

FEATURED STORY:

Top 10 Best Cyber Security Podcasts of 2019

A curation of the 10 best cyber security podcasts designed to
educate and advise you on all things InfoSec.

Filter by Tags: 

Thycotic Integrations provide opportunities to connect, control and secure

January 16th, 2020

Privileged access management (PAM) is a critical piece of your security infrastructure. But we know it’s just one part of your infrastructure which also includes identity and access management platforms, multi-factor authentication systems, SIEM tools, IT ticketing systems, DevOps tools, and more. Just as single products that aren’t usable result in slow implementation and low…


How to protect service accounts without losing your mind: Automated tools!

January 14th, 2020

Here at Thycotic, we are always banging the drum on the importance of securing privileged access. Early in 2019, we got a glimpse of what can happen if you don’t when more than 100 million credit applications at Capital One were stolen by an individual in a security breach that involved a web service and…


The robots are here. Actually, they’ve been here for a while

January 7th, 2020

Every team across your organization is looking for ways to free up more time. In the past year, Robotic Process Automation (RPA) has exploded as a new way to remove tedious, repetitive tasks from the shoulders of humans and give them to—you guessed it—robots. RPA essentially creates a non-person account—a “bot”—that mimics the activities of…


DevOps Secrets Vault for Speed and Security

December 31st, 2019

Most advances in DevOps today are being leveraged for speed. Continuous integration and continuous delivery (CI/CD) is driven by the need to meet internal demands, meet customer demands, and adapt to the competition. However, as the headlines constantly remind us, security can’t be overlooked in our rush to deploy. No matter where your organization is…


Thycotic posts unprecedented year of industry awards recognition

December 26th, 2019

This was an unprecedented year for industry recognition of Thycotic’s leading PAM software solutions, with Thycotic capturing 35 awards in 2019 alone.  That’s a record that few, if any, of our competitors in the Privileged Access Management space can match in terms of market awareness and acceptance. While too numerous to list all of them…


Why are security and business goals at odds with each other?

December 24th, 2019

Few jobs are more challenging than that of a CISO. Constantly on call and under intense pressure, they’re not only keeping critical systems running and sensitive data protected, but also working to uphold a rapidly evolving list of regulatory demands. Yet CISOs and their teams do much more than act as the company ‘bodyguard’. They…


7 Best Books to Grow Your Cyber Security Career

December 19th, 2019

Thanks to the increasing number of cyber-attacks globally, cyber security is now one of the most in demand career fields. Every year individuals and organizations face the looming threat that it will be the “the worst year yet”, so how are you supposed to stay ahead? A 2019 Cybersecurity Workforce Study by (ISC)² found, “The…


Newest Secret Server Release Enhances Performance, Flexibility and Control

December 17th, 2019

Our customers are at the heart of everything we do.  So it's been a busy year at Thycotic as we've rolled out a number of new solutions and enhancements to create an even more seamless experience for our Secret Server customers.  This drives PAM adoption to protect a large and diverse set of privileged accounts…


Thycotic’s Cyber Security Predictions and Trends for 2020

December 12th, 2019

Which cyber security predictions or trends do you think will become reality? 2019 has been an exciting and interesting year for those of us with an interest in cyber security.  The topic is top of mind for governments and business leaders around the world as they wrestle with the ever-evolving challenge of reducing cyber-attack risks.…


https://thycotic.com/wp-content/uploads/2019/11/Privilege-Manager-Release-02-1024x536.png

New Privilege Manager Release Extends Endpoint Protection for Macs

December 10th, 2019

Apple products continue to grow in popularity. With strong iPhone X and 11 sales, Apple is boosting their smartphone market share. And it’s not just consumer products where we’re seeing growth. Enterprises are using Macs more and more and Thycotic is seeing significant growth in these devices and operating systems. Endpoints present a significant security…