Thycotic Telephone Number +1-202-802-9399 (US)

Thycotic’s Cyber Security Publication

FEATURED STORY:
Your Next Great Move

Why moving PAM from on-premise to cloud could be your next great move

Filter by Tags: 

Service Account Governance: Reduce your attack surface with Account Lifecycle Manager

August 20th, 2019

Service accounts abound in every organization. Failure to manage them leads to significant risk. This has been a critical issue for organizations that use Active Directory and have grown to a level that accounts can no longer be managed by hand. Almost all medium to large organizations suffer from extreme service account sprawl, perpetuating the…


Building a PAM business case: cost-justifying privileged access management projects

August 13th, 2019

Most IT or security projects require a formal approval process, and that often includes a written business case. An IT business case document can vary from a simple one-page write-up to a full-blown justification paper with detailed cost and return-on-investment calculations. Many organizations have standard business case templates, but here’s what type of information a…


How to Find Your Best Match Among Privileged Access Management Vendors

August 6th, 2019

So, you want to bring on a PAM solution and you’re either selecting a Privileged Access Management vendor for the first time, or you may be “upgrading” from a typical password manager software product.  In any case, you’re probably looking for several PAM capabilities, as well as how best to deploy your proposed PAM solution:…


Top 5 Black Hat 2019 Sessions Not to Miss. Plus: Bonus Travel Tips to Hacker Cons

August 1st, 2019

The Black Hat USA 2019 conference is about to start. Over 17,000 security professionals will come from all around the world to Las Vegas, USA. They will learn, share, educate and disclose security research on the latest cyber-threats and attacks, vulnerabilities, and techniques used to bypass security used by most governments and organizations globally. Without…


Cloud Use Cases: Critical PAM controls to secure a modern cloud environment

July 30th, 2019

Virtually all cloud security failures will be the customers’ fault. That’s what Gartner believes the future of cloud security for the enterprise will look like within the next four years. More than half of cloud security issues will be caused by inadequate management of identities, access and privileges. “The challenge exists not in the security…


Take Control of Secrets in Your DevOps Environment

July 23rd, 2019

DevOps has emerged as a key practice to maintain speed and innovation where technology and software development drives business. Now, at least half of IT organizations are using DevOps, accelerating their ability to release new code to accommodate ever more competitive market demands. The aim is to improve speed while simultaneously reducing chances of defects…


You break it, you buy it: Fear of unknown dependencies hinders service account governance

July 16th, 2019

Thousands of services run on a typical corporate network. They include multiple services which are core to network security, network services, and IT automation, such as Windows services, scheduled tasks, batch jobs, application pools within IIS, and more. To connect automatically across a network to databases, file systems, and network services, these services rely on…


Top 10 Best Cyber Security Podcasts of 2019

July 9th, 2019

Podcasts have transformed the way we digest news, learn on the go, and optimize our commutes. With podcasts gaining popularity due to their ability to fit into our busy lives, a wave of new cyber security experts have launched a series of IT podcasts to keep us informed about the latest security threats, InfoSec tools,…


Moving from on-premise to Privileged Access Management (PAM) in the cloud could be your next move

July 2nd, 2019

Are you considering moving from an on-premise PAM solution to one that delivers the security you expect for privileged credentials while still gaining the advantages of a cloud-based solution? If so, you’ll want to take a few tips from Tim Enders, Senior System Engineer at Loyola University Maryland’s Department of Technology Services—the Loyola University case study…


Protect Your Privileged Credentials with WebAuthn

June 25th, 2019

85% of organizations fail to achieve basic PAM capabilities according to Thycotic’s 2019 State of Privileged Access Management (PAM) Maturity Report.  This is due in large part to poor security hygiene. It’s essential that organizations deploy proper security precautions to ensure privileged user accounts are not vulnerable or even already compromised. Organizations still struggle with…