+1-202-802-9399 (US)

Thycotic’s Cybersecurity Publication

FEATURED STORY:
Cyber Security Responsibilities: Who owns your organization’s PAM Policy Template? 

Who is responsible for creating, implementing and overseeing your organization’s Privileged Account Management Policy template? And what is at risk if no individuals or departments are named to ensure that your users and systems are in compliance with your PAM Policy?

Filter by Tags: 

MSPs: How do you get customers to pay for Privileged Account Management?

February 23rd, 2018

According to the Verizon 2017 data breach report, privilege misuse is the 2nd most cause of incidents. As a managed service provider there are two separate, but just as serious, points to consider. 1.You are using and storing privileged account credentials for your customer's networks so your technicians can perform their jobs quickly 2.Your customers…


Top 10 Keys to Successful Least Privilege Adoption Via Application Control

February 15th, 2018

Gone are the days when a security team could select a new tool, turn it on, and expect everyone in the organization to adjust. When security hinders the business, the business fights back. Users now have numerous ways they can work around security tools and policies to get their job done. Least privilege is a…


Top 5 Ways to Win your CEO/CTOs Heart

February 13th, 2018

In today’s always-connected world it’s important to realize that, historically and traditionally, cybersecurity was the responsibility of the IT department. Any time a cyber incident or data breach occurred or security questions arose, these got deferred to IT for the answers. Failure to translate cyber risk into business risk has left many businesses clueless But…


Integrating Privileged Account Management Into DevOps

February 8th, 2018

By 2021, security practices will be embedded in 80% of rapid development teams. That’s a rapid increase from 15% in 2017, according to Gartner. Hence the term, “DevSecOps.”  Just a few years ago, DevOps was still a new concept, only implemented by cutting-edge tech teams pushing out dozens or hundreds of software updates per day. These days, at…


Which of your endpoints is most likely to let an attacker inside?

February 6th, 2018

Is your organization trying to reduce the risk of malware or ransomware in 2018?  Knowing where to start can be the hardest part.  The following risk factors can increase the odds of a cyber attack, and being aware of them can help you focus on and secure your most vulnerable endpoints. Any machine that users…


Cybersecurity for Dummies Part 2: Responding in the Wake of a Cyber Attack

February 2nd, 2018

With cyber threats, it’s a matter of when and not if you’re going to be impacted. Some attacks are within your control, and some aren’t, so you need to be prepared for what to do when you do become a victim. Understanding the method of threats you face can help you identify any hack or…


Cybersecurity for Dummies Part 1: Making Cybersecurity Everyone’s Responsibility

January 30th, 2018

In our always-connected world where the private information of individuals and organizations is vulnerable to exposure and misuse, cybersecurity is everyone’s responsibility because hackers or malicious threat actors who steal proprietary information don’t care about age, gender, race, culture, beliefs, or nationality. They probe your digital footprint and your Internet-connected computers based on opportunity, often…


Data Privacy Day: Where has privacy gone, and will we ever get it back?

January 26th, 2018

Privacy is gone, but never forgotten. Can our current path even be reversed? Yes, the end of privacy as we know it is closer than you may think.  Privacy definitions are very different between nation states and cultures, though one common thread is that privacy is becoming less of an option for most citizens, globally.…


Secret Server and Privilege Manager 10.4: Six improvements mean more security in less time

January 25th, 2018

Thycotic is proud to announce the release of version 10.4 for Secret Server and Privilege Manager. Secret Server 1. Software Development Kit (SDK) One of the greatest problems in IT security today is the widespread use of embedded credentials—usually as part of a connection string, scripts and applications can contain usernames and passwords that they…


Why is least privilege the place to start for endpoint security?

January 23rd, 2018

Because it will save you time and money.   Your end user’s computers are increasingly exploited as an attack vector used to attain accounts with local administrator rights on Windows or root access on Mac OS. There are a lot of solutions that promise malware detection and prevention. And you can buy more and more software to try to prevent these…