Phone Number +1-202-802-9399 (US)

Thycotic’s Cyber Security Blog

FEATURED STORY:

The 7 Deadly Privileged Accounts You MUST Discover, Manage, and Secure

Gain an understanding of the privileged accounts that put your organization at risk if not secured.

7 Types of Privileged Accounts

Filter by Tags: 

Breaking the Glass With Unlimited Administration Mode

January 14th, 2022

What happens when a user creates secrets and does not share them with anyone else, or if you are administrating Secret Server and need to re-organize your secrets? Secret Server’s “break the glass” feature, Unlimited Administration Mode, can help in those situations. The Unlimited Administrator Mode allows designated users to manage Secrets they would normally…


Jumpstart Your 2022 Security Resolutions by Trying the Latest Version of Secret Server

January 11th, 2022

Whew, we made it. 2022. After a somewhat rocky 2021—and 2020 for that matter—what’s on your New Year’s Resolution list? Does your list include some of those perennial promises, like “get in shape” or “save money”? Or maybe you’ve got your sights set on some new ones like, “whittle down those streaming subscriptions,” or “use…


7 Steps to Recognize and Combat Cyber Crime

January 4th, 2022

Recognizing and combating cyber crime This is one of the most talked-about topics in the media and in the boardroom in recent years. It is a major problem and challenge for many organizations. The average dwell-time (average time before a company detects a cyber breach) is more than 200 days, highlighting this as an area…


2022 Cyber Predictions: Ransomware, Hacking eSports, and COVID Cleanup

December 28th, 2021

In many ways, 2021 felt like an extra dose of 2020. Bright spots like COVID vaccines aside, most of us simply put our heads down and plowed ahead as the hits just kept coming. Responses to COVID accelerated digital transformation by as much as seven years, adding new tools and process automation to the security…


Interview: CTO Q&A with David McNeely

December 21st, 2021

In any C-Suite role, governance is paramount. But a CTO needs to help drive value using technology to help it achieve its business objectives. To hear more about his role as CTO and his journey down the road of privileged access management, I was happy to chat with my long-time friend and colleague, David McNeely.…


The 7 Deadly Privileged Accounts You MUST Discover, Manage, and Secure

December 14th, 2021

Privileged accounts and privileged access are at the heart of every business today. They ensure that the IT team can administer and manage the organization’s systems, infrastructure, and software, and they enable employees to access the data that enables them to make critical business decisions. Not only are most businesses dependent on privileged accounts, but they…


An Ethical Hacker’s Guide to IoT Security Risks and Challenges: Part 2

December 7th, 2021

This post is part of a series about IoT security risks and how you can minimize them. Read Part 1 here. Welcome to the second post in our series on the challenges associated with the Internet of Things (IoT).  In An Ethical Hacker's Guide to IoT Security Risks and Challenges: Part 1, we took an…


An Ethical Hacker’s Guide to IoT Security Risks and Challenges: Part 1

November 30th, 2021

This post is part of a series about IoT security risks and how you can minimize them. Read Part 2 here. Welcome to the world of IoT (Internet of Things). More devices get connected online every minute, with more than 9-billion devices performing all sorts of tasks and automation. Every day, employees power up their…


Back to Basics: Service Account Management 101

November 23rd, 2021

Service accounts don’t have to be a nightmare. Get them under control now. Service accounts are typically used in operating systems to execute applications or run programs, either in the context of system accounts (high privileged accounts without any password) or a specific user account, usually created manually or during software installation.  On Unix and…


Securing Secrets is Key to DevOps Innovation says New Forrester Survey Report

November 16th, 2021

A new survey and report from Forrester commissioned by ThycoticCentrify highlights what IT security and business leaders consider their biggest DevOps security challenges and what they want to see in solutions that will effectively resolve them. Solutions to what Forrester calls the DevOps “security innovation paradox” are critical for organizations, because sacrificing security in the…