+1-202-802-9399 (US)

Thycotic’s Cybersecurity Publication

FEATURED STORY:
The 6 Most Disturbing Data Breaches
In 2018 So Far

And how they could have been prevented

Filter by Tags: 

Lower Risk of PowerShell Vulnerabilities with Privilege Management

November 28th, 2018

PowerShell and other scripting tools are part of an IT professional’s arsenal. They are incredibly powerful, a force multiplier which allows you to automate important or frequently used tasks. The same traits that make these tools a boon for IT pros also make them valuable to malicious actors who can use them to exponentially increase their…


Together Thycotic & IBM Deliver Next-Generation Privileged Access Management

November 27th, 2018

Did you hear the news? We’ve entered into an original equipment manufacturing (OEM) agreement with IBM Security! This partnership comes with an increased need for organizations to secure privileged accounts that are connected to just about every device on the network. Breaches through privileged accounts are on the rise. Now more than ever, organizations need…


Least Privilege Uncovered

November 20th, 2018

Organizations around the world are challenged by an ever-growing cyber threat landscape and are experiencing serious cyber fatigue. Their employees are dealing with constant information overload about cyber attacks, ransomware, identity theft and phishing scams. Employees are exposed to risky behavior For years, employees across all departments in most organizations have habitually practiced risky behavior,…


Thycotic moves into leadership position for Privileged Identity Management in Forrester Wave

November 14th, 2018

This week Forrester Research Inc. named Thycotic a Leader in Privileged Identity Management, along with CyberArk, Centrify, and Beyond Trust.  The Forrester Wave™: Privileged Identity Management, Q4 2018 Report* evaluated 11 vendors based on 35 criteria across the categories “Current Offering”, “Strategy” and “Market Presence”.  Thycotic earned the highest possible scores for Privileged Password Safe/Vault, Users, Roles, and Helpdesk Integration, and Reporting.  Additionally, Thycotic received the highest…


How to get your entire company on board with Privileged Access Management

November 13th, 2018

Maybe you’ve recently failed an audit, or you can’t stand yet another password being uploaded to your IT team’s risky, shared Excel doc. For whatever reason you are here, you are ready to tackle Privileged Access Management head on. But hold on, you may have a few hurdles you have to overcome first. Before you…


Back to the Basics: Service Account Management 101

November 8th, 2018

Service accounts don’t have to be a nightmare. Get in control now.  Service accounts are typically used in operating systems to execute applications or run programs, either in the context of system accounts (high privileged accounts without any password) or a specific user account, usually created manually or during software installation.  On Unix and Linux…


Enterprise Password Management for Everyone from SMBs to Corporations: Everything You Need to Know

November 6th, 2018

A simple yet effective business password management system takes high priority on the wish-list of every organization, big and small. This is evidenced by the sheer volume of people searching Google for “the best password protection” every day. But what may surprise you is that whether you’re attempting to manage passwords for a huge corporation,…


5 Spooky Privilege Security Mistakes that Will Haunt Your Organization

October 30th, 2018

It’s a dark and stormy night. Suddenly your system locks up. Then you get a message, demanding online payment to release your sensitive data back to you. Unfortunately, this isn’t a Halloween prank. Ransomware is on the rise and organizations of all types are falling victim. Your risk of cyber-attack exponentially increases if you’ve made…


Get Complete Application Control Management with CylancePROTECT and Privilege Manager

October 19th, 2018

Thycotic customers are constantly requesting integrations with other products in their arsenal, especially other security products. Thycotic’s product team for Privilege Manager—our least privilege and application control product—is asked to work with CylancePROTECT® day after day. Our common customers are using both Thycotic and Cylance products on the endpoint to provide multiple layers of malware protection.…


Thycotic’s Strategic Alliance program means Privileged Access Management Security for everyone

October 16th, 2018

Privileged Access Management is an important and vital security solution that helps protect one of the most important assets in an organization.  Software vendors can simply enable and empower their solutions by integrating into the world’s most popular, friendly, easy-to-use and most valuable Privileged Access Management solution available. Organizations and governments around the world have…