Phone Number +1-202-802-9399 (US)

Thycotic’s Cyber Security Blog

Gartner Magic Quadrant Privileged Access Management Thycotic

FEATURED STORY:

Thycotic named a
Leader in Gartner 2020
PAM Magic Quadrant

Filter by Tags: 

Every system is a privileged system: Incorporating Unix/Linux in your privilege management strategy

November 24th, 2020

Lately we’ve been banging the drum that “every user is a privileged user,” meaning privileged users aren’t limited to system administrators but also include business users with access to applications and endpoints linked to critical business data and functions. The second verse to that refrain is that “every system is a privileged system.” Within your IT environment,…


How Recent Analyst Research can Help You Find the Right PAM Vendor

November 19th, 2020

According to recent technology buying decision research sponsored by Thycotic, a significant number of executives, IT security and operations teams look primarily to the advice of independent analysts when evaluating a PAM or PIM solution that would work best for their organizations. That means independent analysis becomes very important in identifying vendors that belong on your…


How to Expedite Discovery of Service Accounts for Onboarding into Service Account Governance

November 17th, 2020

Service accounts, by their nature, can take on a life of their own. They’re rarely tied to a human owner if managed at all, so service account sprawl takes over and organizations’ privileged account attack surfaces can expand almost beyond measure. And with almost all medium to large organizations unable to pull service accounts into…


Ensuring Database Security in the DevOps Pipeline with Dynamic Secrets

November 10th, 2020

The traditional “vault-and-forward” method for secrets management means a user or application authenticates to the vault and then gets access to the secrets they need. The fundamental problem is once those secrets are out of the vault, it is extremely difficult to ensure their safety. In the case of an application, the ways Secrets can…


Election Protection: How Cyber Criminals Could Steal Your Vote

November 3rd, 2020

How much should we worry about the security of the upcoming US presidential election? Could a hacker or nation-state actor influence the result? Well, there’s good news and there’s bad news for election cyber security. The good news is that The Cybersecurity and Infrastructure Security Agency and the FBI, in a joint statement, said they…


Cyber Security and the Future of Connected Devices

October 27th, 2020

Before I take you on a journey to the future of connected devices, let's briefly reflect on how we got where we are today. During my career, I'm fortunate to have been involved in many exciting technology and digital innovations. It's important to share some of these with you so you fully understand how amazing…


Remote Worker Security: The Risks, Challenges, and Solutions

October 20th, 2020

The concept of working remotely, or granting remote access, isn’t anything new for most IT professionals. Most organizations have embraced a remote workforce, be it their own employees, contractors, consumers, business partners, and managed service providers. What does “working remotely” mean today? For IT professionals, remote access had been thought of as performing your job…


Protect Yourself at Work and Home to Avoid Becoming a Victim of Cyber Crime

October 15th, 2020

Cybersecurity is no longer simply a technology challenge. It’s a challenge for everyone who interacts with technology. The protection of work and personal life are no longer separated. They’ve become intertwined thanks to social networks, the Internet of Things, and unlimited connectivity. This means cybersecurity is no longer solely the responsibility of a company IT…


How do you make cyber security tech buying decisions? Here’s what your peers say.

October 13th, 2020

How do CISOs and other IT security professionals make informed decisions about tech purchases? A research survey commissioned by Thycotic was conducted among more than 900 CISOs / Senior IT decision-makers across nine countries in August 2020. The report of survey results takes a close look at how IT and security professionals make technology buying…


National Cyber Security Awareness Month: If you connect it, protect it

October 8th, 2020

Can you spot the red flags of a cyber crime? What behaviors do cyber criminals love to abuse? Here's how to avoid being the next victim! Cyber security is no longer just a technology challenge. It's a challenge for everybody who uses and interacts with technology daily. The protection and security of both your work…