Phone Number +1-202-802-9399 (US)

Thycotic’s Cyber Security Blog

FEATURED STORY:

Top 10 Best Cyber Security Podcasts of 2019

A curation of the 10 best cyber security podcasts designed to
educate and advise you on all things InfoSec.

Filter by Tags: 

12 Days of Privileged Access Management Giveaways

December 3rd, 2019

The more things change, the more they stay the same. We pride ourselves on pushing the envelope, finding new ways to do things, and solving the next cyber puzzle. But when it comes to this time of year, we love our Thycotic traditions. The 12 Days of Thycotic is one of those annual rituals that…


PAM in the cloud vs. PAM for the cloud. What’s the difference?

November 26th, 2019

“Are you talking about PAM in the cloud or PAM for the cloud?” “Wait, what’s the difference?” We hear these questions a lot from our customers. And, we have to admit the “PAM in the cloud vs. PAM for the cloud” debate has caused some confusion even in our internal meetings. Cloud has exploded. Simply…


Privileged Access Management 2019: A Year in Review

November 19th, 2019

Another year has passed, and cyber attacks did not take a vacation or enjoy any time off. Cyber attacks wreak havoc on businesses 24/7. And cyber threats constantly increase and evolve, so organizations must adapt to become resilient to the newest threats. Not all successful cyber attacks are sophisticated This year confirmed that not all…


Service Account 201: Service Accounts in the Cloud

November 12th, 2019

I wrote about the basics of service account management in Back to Basics: Service Account Management 101.  Before I dive into service accounts in the cloud, here's a quick recap of that post. A quick recap on Service Accounts 101 What exactly are service accounts and why are they needed?  Most organizations have two types…


Could basic password security practices have helped prevent the latest Equifax lawsuit?

November 7th, 2019

Fallout from the 2017 Equifax data breach is back in the news as a new class-action suit consolidated 373 previous lawsuits into one. Unlike previous lawsuits filed by Equifax customers, the latest action comes from shareholders that allege the company didn’t adequately follow or disclose security practices, including poor password management. If you google, “what…


Why Usable Security Should Drive Your Decision in Selecting a PAM Tool for Your Organization

November 5th, 2019

What is Usable Security At Thycotic ease of use has been a consistent focus with our products, but we have started to use the term Usable Security more frequently. Usable security is much more than a Thycotic marketing term. Usable security is an academic field of study that evaluates the usability of computer security. We…


SSH proxies vs. jump hosts—how to save time and spend less

October 29th, 2019

Security practices are constantly evolving. What might have been considered a state-of-the-art approach ten or even five years ago is no longer defined as a best practice.     In the case of securing Remote Desktop Protocol (RDP), PAM practices have followed this pattern of evolution. What was once a common way of securing RDP—jump hosts—is…


Limit access for third-party vendors without restricting their ability to get work done

October 22nd, 2019

Companies often work with outside experts, consultants and other third-party vendors who need privileged access to corporate resources. These third-party entities can’t do what they were hired to do if their access is too restrictive. You can’t maintain a strong security posture if access and oversight are too lax. How do you, a security professional,…


SWIFT Controls, Cyber Crime and Privileged Access Management: Securing Banking and Finance

October 15th, 2019

The Society for Worldwide Interbank Financial Telecommunication (SWIFT) provides financial messaging services to banks, financial institutions and corporations all over the world. The technology is used to exchange sensitive information about financial transactions by more than 11,000 customers in over 200 countries. Financial institutions: a major target for cyber criminals; a critical subject for security…


Trick or Treat? Stay safe during National Cybersecurity Awareness Month in October, and beyond

October 8th, 2019

Ah, October! Summer has officially come to an end and we’ve quickly moved on to jumpers, football, and pumpkin everything. October is also National Cybersecurity Awareness Month. The theme for 2019 is “Own IT. Protect IT. Secure IT.”  But it needn't be scary, and the tricks or treats you get at the end of the…