Phone Number +1-202-802-9399 (US)

Thycotic’s Cyber Security Blog

Gartner Magic Quadrant Privileged Access Management Thycotic

FEATURED STORY:

Thycotic named a
Leader in Gartner 2020
PAM Magic Quadrant

Filter by Tags: 

Cyber Security and the Future of Connected Devices

October 27th, 2020

Before I take you on a journey to the future of connected devices, let's briefly reflect on how we got where we are today. During my career, I'm fortunate to have been involved in many exciting technology and digital innovations. It's important to share some of these with you so you fully understand how amazing…


Remote Worker Security: The Risks, Challenges, and Solutions

October 20th, 2020

The concept of working remotely, or granting remote access, isn’t anything new for most IT professionals. Most organizations have embraced a remote workforce, be it their own employees, contractors, consumers, business partners, and managed service providers. What does “working remotely” mean today? For IT professionals, remote access had been thought of as performing your job…


Protect Yourself at Work and Home to Avoid Becoming a Victim of Cyber Crime

October 15th, 2020

Cybersecurity is no longer simply a technology challenge. It’s a challenge for everyone who interacts with technology. The protection of work and personal life are no longer separated. They’ve become intertwined thanks to social networks, the Internet of Things, and unlimited connectivity. This means cybersecurity is no longer solely the responsibility of a company IT…


How do you make cyber security tech buying decisions? Here’s what your peers say.

October 13th, 2020

Commissioned by Thycotic, a research survey was conducted among more than 900 CISOs/Senior IT decision-makers across nine countries in August 2020. The report of survey results takes a close look at how IT and security professionals make technology buying decisions, and what most influences Boards to invest in cybersecurity. The new report, entitled, Cyber Security…


National Cyber Security Awareness Month: If you connect it, protect it

October 8th, 2020

Can you spot the red flags of a cyber crime? What behaviors do cyber criminals love to abuse? Here's how to avoid being the next victim! Cyber security is no longer just a technology challenge. It's a challenge for everybody who uses and interacts with technology daily. The protection and security of both your work…


The Impact of the California Consumer Privacy Act on Privileged Access Management

October 6th, 2020

Consumers are demanding greater control and security over the collection and processing of their personal data. A bevy of privacy laws are rolling out across the world and multiple U.S. states, driving changes in data governance and security practices. The California Consumer Privacy Act (CCPA) has the broadest impact of any U.S. state or federal…


Bring to Light the Security Risks of Web Applications run by Shadow IT

September 29th, 2020

A quiet proliferation of SaaS and web applications and infrastructure with web-based interfaces is taking place throughout your organization. These applications are often essential to business, financial, and technical users. Yet, security and operations folks who are tasked with safeguarding your entire IT environment are likely unaware of the breadth of applications in use. Even…


Integrating Service Account Management Within Existing IT Workflows

September 22nd, 2020

IT service management providers have made strides replacing collections of legacy tools with a single unified IT service management platform. However, there are still many aspects of IT administration that must be done manually outside of such unified platforms. Service account management is one task that is commonly cumbersome to IT administrators and those in…


DevOps Secrets Vault Release Offers Out-of-the-Box Secret Server Integration and New Home Vault Feature

September 15th, 2020

For DevOps teams, on-demand access to source code, tools, test servers, and production builds are necessary to administer systems and debug production issues. The focus for DevOps security should be automation It’s common to share private keys and credentials for immediate access, which increases the risk from both external and insider threats, either malicious or…


What does world-class Identity Governance look like?

September 10th, 2020

Identity governance is a critical foundational practice required to secure and manage privilege and access across the enterprise. Organizations are required to demonstrate an enterprise identity governance program that complies with nearly every significant compliance audit for almost every industry. Identity governance programs are typically deployed as part of the security stack that includes Identity…