+1-202-802-9399 (US)

Thycotic’s Cyber Security Publication

FEATURED STORY:
The 7 Most Dangerous Privileged Accounts

Every organization must discover, manage and secure these 7 deadly privileged accounts to reduce their business security risk.

Filter by Tags: 

Protect Your Privileged Credentials with WebAuthn

June 25th, 2019

85% of organizations fail to achieve basic PAM capabilities according to Thycotic’s 2019 State of Privileged Access Management (PAM) Maturity Report.  This is due in large part to poor security hygiene. It’s essential that organizations deploy proper security precautions to ensure privileged user accounts are not vulnerable or even already compromised. Organizations still struggle with…


Service Account Governance: Provisioning to Disposal and Everything in Between

June 18th, 2019

When Bank United’s Anne Gorman first tried to inventory her company’s service accounts, she was flying blind.  “We didn’t know how many service accounts we had. We didn’t know where the service accounts were. Nobody even knew the passwords to think about what the service accounts ran. It was a hot mess,” Anne admits. Bank United’s struggle with privileged…


Your city does not have to be a victim of ransomware

June 11th, 2019

These cities have a common foe. Albany, New York; Baltimore, Maryland; Orange County, N.C.; Sammamish, Wash; Atlanta, GA They have all been subject to Ransomware attacks in the past 12 months. The most recent victim being Baltimore, MD which has been the target of ransomware twice in the past year. According to the 2019 Verizon Data Breach Investigations…


The Redesign of Secret Server: What went into making Secret Server this good?

June 4th, 2019

We are excited to introduce the redesign of Thycotic Secret Server! In 2019, Thycotic has invested heavily in UX. We have built a team of UX and Human Computer Interaction Specialists to lead these initiatives. We are improving the UX/UI of all Thycotic products in 2019 as we continue in our efforts to remain the…


Thycotic SCIM Connector for Integrations with Secret Server

May 30th, 2019

Today, many organizations have both privileged account management (PAM) and identity governance solutions that operate independently. As a result, organizations lack the ability to have a unified view of identities. As we discussed in “Top PAM Technology Integrations,” while PAM secures access to key system and admin accounts, integration with Identity & Access Management (IAM)…


Fast, Faster, Fastest: Speed Requirements for Your Password Vault

May 28th, 2019

You’re facing unprecedented pressure to deliver higher levels of service and improve speed to market. At the same time, you need enterprise-wide visibility and control to reduce risk. Do you need a high-speed password vault to protect privileged accounts? If so, how fast is fast enough? These are the questions we’ve been asking to develop…


Key Takeaways from the 2019 Verizon Data Breach Investigations Report

May 21st, 2019

The Verizon Data Breach Investigations Report 2019 is now publicly available to download or read online. It’s the 12th edition, and not surprisingly, it reveals that cyber criminals are still successfully using their hacking techniques—many of which are very common—and that we have failed to stop them. However, we are getting better at stopping them.…


6 PAM Technology Integrations That Should Be On Every PAM Admin’s To-Do List

May 14th, 2019

Mastering the art and science of integrating other technologies with PAM solutions to enable maximum cyber security visibility and efficiency is no small task. Start from the premise that PAM controls work best when they are integrated with other IT and cyber security tools.  With tight integration, the IT Admin with an advanced level of knowledge can…


Are We Becoming an Industry of PAM “Haves” and “Have-Nots?”

May 7th, 2019

We are worried. A few years back, Gartner reported that more than 65% of organizations allow unrestricted, unmonitored and shared use of privileged accounts. (Forecast Snapshot: Privileged Access Management, Worldwide, 2017). Surely, we thought, with high-profile cyber-attacks in the news and rapid growth of the PAM industry, that number must be decreasing. So, at the…


World Password Day 2019: The 6 Worst Password Fails

April 30th, 2019

We’ve covered a lot of password security tips and ways to secure your credentials on The Lockdown. For World Password Day 2019 we thought we’d do things a bit differently and share some of the worst password fails this past year.  While these organizations and individuals may not appreciate the extra attention, these password fails…