+1-202-802-9399 (US)

Thycotic’s Cybersecurity Publication

FEATURED STORY:
Cyber Security Responsibilities: Who owns your organization’s PAM Policy Template? 

Who is responsible for creating, implementing and overseeing your organization’s Privileged Account Management Policy template? And what is at risk if no individuals or departments are named to ensure that your users and systems are in compliance with your PAM Policy?

Filter by Tags: 

RSA Conference 2018: A secure internet starts with YOU, and it’s everyone’s responsibility

April 24th, 2018

It was another quiet morning, though this might have been because it was around 5am in the morning and I was still struggling to adjust to the time zone change from Tallinn, Estonia to San Francisco—a measly 10 hours.  I knew the days that lay ahead would be interesting but fun.  Yes, it is that…


Symantec Internet Security Threat Report 2018: The Top Takeaways

April 17th, 2018

It has been a very interesting past year with a few surprises along the way, but as expected cyber-crime grew significantly; financial impact was huge and many companies struggled to recover from cyber-attacks. Cyber security—or the lack of it—is rapidly impacting everyone’s daily life and there is no longer a disconnect between personal and work…


Key takeaways from the 2018 Verizon Data Breach Investigations Report

April 12th, 2018

The latest installment of the Verizon Data Breach Investigations Report 2018 is now available. It’s the 11th edition of the report, and not surprisingly, it reveals that hackers have continued to be very successful at using their hacking techniques (many which are well known) and we have failed to stop them. “HACKERS CONTINUE TO USE…


What DevOps Teams Need to Know about Privileged Account Security

April 10th, 2018

In a DevOps workflow, your testing and production environments are constantly changing. DevOps teams need access to a variety of infrastructures, across cloud, multi-cloud, hybrid cloud and on-prem environments. Administrative privileges are used by the configuration management and orchestration systems that continually spin up new servers, install software and make configuration changes throughout the SDLC. In an “infrastructure as code” model,…


RSA 2018: Top 5 Sessions You Can’t Miss

April 3rd, 2018

The USA 2018 RSA Conference is only a few weeks away and around 45,000 IT security professionals will be arriving in San Francisco to discuss one of the biggest risks and threats to our future, countries, economies and civilization. Yes, cyber security and how to prevent future cyber-wars will be one of the main topics…


Microsoft’s Frankenstein Approach to Endpoint Protection

March 27th, 2018

With Windows 10 Microsoft has embedded and enhanced a number of free tools it claims give IT and security teams the opportunity to close security gaps exposed in previous versions of Windows. One of the critical goals Microsoft aims to address is the principle of least privilege. Under a least privilege policy, administrative credentials are…


Where Privileged Account Management is Really Failing

March 22nd, 2018

Guest post from Alpha Generation a Thycotic certified partner who specializes in IT distribution with a focus on proactive security in the UK. From software vulnerabilities and DDoS to ransomware, the world of cybersecurity can often feel like you’re being pulled in every direction at once. With limited resources, it’s a challenge to know which threats should…


What’s so great about working for Thycotic?

March 20th, 2018

As the Director of Recruitment and Employment at Thycotic, I constantly scour our Glassdoor reviews for input on this topic. I want to understand what makes our employees happy and why other people should want to work with us. With a Glassdoor rating of 4.9 and a 97% CEO approval rating, we must be doing…


Will Fake News Lead to the Next Cyber War?

March 16th, 2018

Fake news is running rampant across all media outlets. While you may not take them seriously, these untrue news stories are playing with your emotions and have serious security implications. With over half the world’s population online and using social media, news travels fast. And sometimes the wrong news gets spread. What happens when it’s…


The EU GDPR Checklist: It’s go time!

March 13th, 2018

Yes, you’ve all heard about it. Many companies have been raising the alarm and increasing awareness about GDPR—General Data Protection Regulation—for months now, all offering solutions for anything at all to do with GDPR. It’s caused a lot of confusion, raised many questions—and organizations have no idea where to start. Many assume they are excluded…