+1-202-802-9399 U.S. Headquarters

Thycotic’s Cybersecurity Publication

FEATURED STORY:
Ransomware goes into stealth mode: 7 things you can do to protect yourself

Ransomware is a destructive variant of malicious malware. It makes critical systems and sensitive information inaccessible until a ransom is paid. Ransom is typically demanded in bitcoin with a 72 hour window to pay before the key is deleted and data is irreversibly lost. Now, it has evolved. Here’s how you protect your organization from the losses suffered in a ransomware attack.

Filter by Tags: 

Need an IAM Solution? Make Sure It Has the Right Foundation

April 19th, 2017

Guest column by SailPoint, the leader in enterprise identity management, brings the Power of Identity to customers around the world. As both an industry pioneer and market leader in identity governance, SailPoint delivers security, operational efficiency and compliance to enterprises with complex IT environments. In today’s highly distributed IT world, where organizations must secure a […]


Top Tips: Extend Identity and Access Management to Protect All Privileged Accounts

April 18th, 2017

The traditional security perimeter is proving no longer an effective cyber security control and fast growing technologies like cloud, mobile and virtualization make the boundaries of an organization blurry. For many years, organizations have protected their valuable and sensitive information by building a fence around those assets. All the data following in and out of […]


The biggest Insider Threats and 5 steps federal agencies must take to reduce IT Security Risk

April 17th, 2017

NISPOM defines insider threat as “Anyone with authorized access to government resources that uses that access to do harm to the security of the U.S.” In the government space, both agencies, contractors, and IT staff will typically have a high level of privileged access. In some cases, they have specialized clearance levels so they can […]


VIDEO: Key Benefits of Privileged Behavior Analytics

April 5th, 2017

Wouldn’t it be nice to ignore the “clutter” around privileged accounts and be notified immediately when there are indicators of privileged account abuse? According to Forrester, it is estimated that 80% of breaches involve Privileged Accounts. If you don’t have a system in place, your organization may never detect a stolen credential. In this video, […]


Easy read to get your staff and stakeholders up to speed on Privileged Account Management security

April 4th, 2017

We’re constantly fighting an awareness battle in getting IT professionals and business stakeholders to appreciate the urgency associated with securing Privileged Account credentials. With so many high-profile breaches accomplished through the compromise of user passwords and escalation to access privileged accounts, security pros and IT directors are looking for simple ways to educate people throughout […]


Ransomware in Real Life

March 28th, 2017

Ransomware – you hear about in the office, even on the evening news since attackers have become creative in this newer threat invention. Everyone’s talking about it, so, what is it? Ransomware is a type of malicious software designed to block access to a computer system until a sum of money is paid – usually […]


Privileged Behavioral Analytics 101 – How does PBA strengthen IT security

March 21st, 2017

According to Forrester, it is estimated that 80% of breaches involve privileged accounts. Many of those breaches are due to compromised privileged accounts or insider abuse. Our privileged account management tool, Secret Server, already assists you by safeguarding your privileged accounts by storing them in an encrypted repository where you can launch sessions using the […]


A Cloud-First Strategy

March 14th, 2017

Guest column by Mike Somerville originally posted on Ed TechDigest on February 16, 2017 As Manager of Systems Support and Chief Cloud Evangelist, I lead the IT systems team at the University of San Diego. We’re responsible for four data centers, the network, virtualization, servers, and more—everything that needs a password for access. Automating Privileged […]


U Behave Yourself… or consider User Behavior Analytics

March 9th, 2017

Get a load of this: an alarming 57 percent of Americans believe that they know as much, or more, about cybersecurity as their IT Directors, according to a comprehensive survey conducted on behalf of Blumberg Capital. This same group of individuals reported that keeping their work passwords secure (10 percent) is only a little more […]


Washington SmartCEO Recognizes Kathy Moore as a 2017 Executive Management Award Winner

March 7th, 2017

Congratulations to Kathy Moore, Thycotic’s Chief Financial Officer, on winning the 2017 Executive Management Award from SmartCEO! The Executive Management Awards (EMA) program recognizes the top leadership and management in Washington, D.C. Kathy couldn’t be more deserving of this award as she has had a direct positive contribution in leading our expansion efforts and success […]