Phone Number +1-202-802-9399 (US)

Thycotic’s Cyber Security Blog

FEATURED STORY:

The New Cyber Security “Perimeter”: Securing Privileged Access

Secure your vulnerable apps, devices, and cloud data through least privilege access

Cloud Tips

Filter by Tags: 

Privileged Identity Management (PIM) and Identity-Centric Security Controls

April 1st, 2021

The number of identities in the enterprise is exploding. Gaining control of identities related to people as well as machines is a challenge for many organizations. You need to know who your users are and what they do. If you experience a security incident, you must be able to reverse engineer who did what in…


Securing and Hardening Linux and Unix Endpoints Against Cyber Attack: Part IV

March 30th, 2021

This post is part of a series on securing your endpoints against cyber attacks. Read: Part I | Part II | Part III | Part IV How Secure are your Linux Endpoints? An Ethical Hacker’s Guide to Securing and Hardening Linux and Unix Endpoints Welcome to the next post in our series on hardening and…


Thycotic President and CEO, James Legg, Named Executive of the Year 

March 25th, 2021

Thycotic’s own James Legg has been named Executive of the Year in the Global Excellence Award's Security Software category for his leadership in the cybersecurity space. As President and CEO, Legg has spearheaded a culture of talent at Thycotic, cultivating the organization’s overall success and revenue growth rate averaging 3x faster than others in the…


Securing and Hardening Linux and Unix Endpoints Against Cyber Attack: Part III

March 23rd, 2021

This post is part of a series on securing your endpoints against cyber attacks. Read: Part I | Part II | Part III | Part IV How Secure are your Linux Endpoints? An Ethical Hacker’s Guide to Securing and Hardening Linux and Unix Endpoints Welcome to the next post in our series on hardening and…


Beyond Password Managers

March 16th, 2021

Passwords should be complex. Password management should be easy. Consumer password managers are popular solutions for personal password storage. These digital password vaults make it possible for people to have complex passwords for each website and application they use and help them avoid bad habits like writing passwords down or using the same password for…


Protecting IoT and Machine Identities (IDs) with Automated PAM Tools

March 11th, 2021

The most recent Forrester Wave for privileged identity management recognized that machine identities (IDs) are growing at twice the rate of human identities.  Much of this increase is due to the widespread adoption of Internet of Things (IoT) and automation through digital transformation initiatives that rely on cloud-based applications. The proliferation of connected devices and…


Thycotic Cloud Automation Tool Bundle Is Multi-Layered Privilege Security

March 9th, 2021

The explosion of Cloud IT has made privileged access management impossible without automation tools. Critical technical service accounts run through AWS, Azure, and Google Cloud Platform. DevOps teams connect and build cloud applications using CI/CD toolchains. Business users are adopting SaaS tools at a rapid clip—the average enterprise has hundreds of web-based SaaS tools that…


Can You Keep a Secret? Your Secrets Management System Can

March 4th, 2021

There are many different types of secrets in a digital enterprise. Secrets management requires broader and deeper security controls than traditional enterprise password management. It requires a coordinated process for managing all types of secrets in a centralized way to ensure systems and data remain secure. Secrets management keeps all secrets safe, prevents secret sprawl,…


Privilege Manager 11: New Privilege Management Capabilities for Unix and Linux

March 2nd, 2021

With the latest release of Privilege Manager, all endpoints and servers throughout your organization can now follow consistent least privilege and Zero Trust policies, whether they are Windows, Mac, or Unix/Linux. Until now, privilege security for Unix/Linux has been cumbersome and even risky.  Unix/Linux has become the go-to operating system for many types of computer…


Active Directory Security and Hardening: An Ethical Hacker’s Guide to Reducing AD Risks

February 23rd, 2021

Approx. reading time: 8-10mins  This blog is intended for: IT and System Admins IT Security IT Auditors Pen Testers Tech Geeks Anyone moving into a career in Cybersecurity Skip to most common Active Directory misconfigurations In this post, we’re going to focus on common cyber-attacks that target Active Directory (AD). Active Directory is deployed across…