+1-202-802-9399 (US)

Thycotic’s Cybersecurity Publication

FEATURED STORY:
Cyber criminals don’t want to be found

Once a hacker breaches your network the average dwell time before discovery is more than 200 days. So work on the assumption that you are already breached and should constantly hunt for cyber criminals within your network.

Filter by Tags: 

Thycotic’s Strategic Alliance program means Privileged Access Management Security for everyone

October 16th, 2018

Privileged Access Management is an important and vital security solution that helps protect one of the most important assets in an organization.  Software vendors can simply enable and empower their solutions by integrating into the world’s most popular, friendly, easy-to-use and most valuable Privileged Access Management solution available. Organizations and governments around the world have…


(SSH) Keys to Unix Security

October 9th, 2018

Root accounts are the keys to powerful IT systems, the backbone of your entire infrastructure. They use privileged credentials to control shell access, file transfers, or batch jobs that communicate with other computers or apps, often accessed remotely, with local configuration. They can be the trickiest of all types of privileged accounts to secure, particularly…


Ostriches, Zero Day Exploits, and the Elusive CyberSec Expert: Why SMBs Should Implement Cloud-Based PAM

October 2nd, 2018

Small and medium-sized businesses (SMBs) face a cyber security trifecta. Cyber criminals are increasingly targeting the most vulnerable businesses (not just the biggest fish). Sophisticated attackers quickly take advantage of newly revealed vulnerabilities. And, cyber security professionals are in short supply. Maybe SMBs aren’t aware that they can use the same types of security systems…


Gartner says PAM a top cybersecurity priority. Thycotic makes robust PAM in the Cloud a reality.

September 25th, 2018

With the recent introduction of Thycotic’s upgraded Secret Server Cloud offering, organizations worldwide now have a full-featured PAM as a service product they can choose to protect their “keys to the kingdom.” That’s because Secret Server Cloud now delivers all the features and capabilities of our Secret Server on-premise flagship product, available in three editions…


The Black Hat 2018 Hacker Survey Report and Recap by Thycotic

September 18th, 2018

Another Black Hat conference has come and gone and more than 17,000 international security professionals converged on Las Vegas, USA to learn, share, educate and disclose security research on the latest cyber threats, attacks, vulnerabilities and techniques used to bypass the security employed by most governments and organizations globally. Of course, Thycotic’s team was there,…


BUY, BUY, BUY, BUY is sometimes not the answer!

September 17th, 2018

Strategy, vision, and innovation.  These are the key ingredients to creating software that’s good for people and business. Bomgar is desperately wanting to enter the growing Privileged Access Management (PAM) market. Originally, Bomgar started as a Secure Remote Desktop and Remote Support company in a market crowded with free and low-cost solutions.  Under pressure, Bomgar needed…


Recap: Partner UNLOCKED 2018

September 14th, 2018

This year saw Thycotic’s Annual International Partner Conference – UNLOCKED took place in the stunning seaside location, Nice, the heart of the French Riviera. Hosted at the waterfront destination, the Radisson Blu, we were joined from the 4th – 6th September by our wonderful partners from all across the world. From enjoying lunch on a…


Seven Signs It’s Time to Move On from GPO-Only Privilege Management

September 11th, 2018

Many organizations gravitate towards Group Policy Objects (GPO) for privilege management because it offers enough functionality to get started managing privileges. Yet, as your needs evolve, you may find that you require a privilege management system better suited to a maturing, sophisticated organization. What are some of the warning signs that you need more than…


Six Key Differences Between Password Management Tools and PAM

September 4th, 2018

In the past, Privilege Access Management (PAM) was accessible only to large enterprises with skilled IT teams. Feature-heavy PAM tools became more and more complex and expensive to manage. Meanwhile, security-conscious small and medium businesses were relegated to using password tools designed primarily for consumers. While consumer password tools provide a “password vault” to store…


Secret Server Vault Named Best of VMworld Security Finalist

August 31st, 2018

Thycotic Solutions Recognized for Third Finalist Award in Five Years WASHINGTON, D.C., August 31, 2018 — Thycotic, a provider of privileged access management (PAM) solutions for more than 10,000 organizations worldwide, today announced the company was selected as a finalist for the Best of VMworld 2018 Awards in the “Security” category for its Secret Server Vault solution.…