+1-202-802-9399 (US)

Thycotic’s Cybersecurity Publication

Cyber Security Responsibilities: Who owns your organization’s PAM Policy Template? 

Who is responsible for creating, implementing and overseeing your organization’s Privileged Account Management Policy template? And what is at risk if no individuals or departments are named to ensure that your users and systems are in compliance with your PAM Policy?

Filter by Tags: 

Where Privileged Account Management is Really Failing

March 22nd, 2018

Guest post from Alpha Generation a Thycotic certified partner who specializes in IT distribution with a focus on proactive security in the UK. From software vulnerabilities and DDoS to ransomware, the world of cybersecurity can often feel like you’re being pulled in every direction at once. With limited resources, it’s a challenge to know which threats should…

Why should you want to work for Thycotic?

March 20th, 2018

As the Director of Recruitment and Employment at Thycotic, I constantly scour our Glassdoor reviews for input on this topic. I want to understand what makes our employees happy and why other people should want to work with us. With a Glassdoor rating of 4.9 and a 97% CEO approval rating, we must be doing…

Will Fake News Lead to the Next Cyber War?

March 16th, 2018

Fake news is running rampant across all media outlets. While you may not take them seriously, these untrue news stories are playing with your emotions and have serious security implications. With over half the world’s population online and using social media, news travels fast. And sometimes the wrong news gets spread. What happens when it’s…

The EU GDPR Checklist: It’s go time!

March 13th, 2018

Yes, you’ve all heard about it. Many companies have been raising the alarm and increasing awareness about GDPR—General Data Protection Regulation—for months now, all offering solutions for anything at all to do with GDPR. It’s caused a lot of confusion, raised many questions—and organizations have no idea where to start. Many assume they are excluded…

New South Wales Government failure highlights critical nature of PAM

March 9th, 2018

The New South Wales Government’s cyber security strategy is under urgent review after Auditor’s Offices criticised the way its agencies are handling privileged access and other basic security practices. At the end of last year (20th December 2017) the government of New South Wales received an unwelcome Christmas present from its own Auditor’s Office. This…

How to Protect Your Desktop Team When Moving to Least Privilege 

March 6th, 2018

When companies yank local administrative privileges from business users without considering the downstream impact, their least privilege programs are doomed to fail. Suddenly unable to download applications, run programs, install printers or make other system changes, users will be confused and frustrated. Those frustrations are going to land squarely on the plate of the desktop support team.   Imagine a desktop…

Privileged Behavior Analytics Deep-Dive: Responsive Actions

February 27th, 2018

Privileged Behavior Analytics Recap Thycotic’s Privileged Behavior Analytics (PBA) software monitors user activity within Secret Server to detect anomalous behavior.  Once the user’s baseline activity is determined, deviations from that behavior can trigger alerts or warnings to notify security admins.  The software’s machine learning considers the time of day, IP address, user history, Secret importance,…

MSPs: How do you get customers to pay for Privileged Account Management?

February 23rd, 2018

According to the Verizon 2017 data breach report, privilege misuse is the 2nd most cause of incidents. As a managed service provider there are two separate, but just as serious, points to consider. 1.You are using and storing privileged account credentials for your customer's networks so your technicians can perform their jobs quickly 2.Your customers…

Top 10 Keys to Successful Least Privilege Adoption Via Application Control

February 15th, 2018

Gone are the days when a security team could select a new tool, turn it on, and expect everyone in the organization to adjust. When security hinders the business, the business fights back. Users now have numerous ways they can work around security tools and policies to get their job done. Least privilege is a…

Top 5 Ways to Win your CEO/CTOs Heart

February 13th, 2018

In today’s always-connected world it’s important to realize that, historically and traditionally, cybersecurity was the responsibility of the IT department. Any time a cyber incident or data breach occurred or security questions arose, these got deferred to IT for the answers. Failure to translate cyber risk into business risk has left many businesses clueless But…