Phone Number +1-202-802-9399 (US)

Thycotic’s Cyber Security Blog

FEATURED STORY:

How to Remove Admin Rights Without Reducing Productivity

Mitigate risks related to over-privileged users to secure your endpoints and ensure compliance

Filter by Tags: 

What to expect when working with Thycotic Professional Services

January 12th, 2021

Thycotic customers come in all shapes, sizes, and levels of experience. Some are new to PAM. Perhaps they recently inherited the program. Or maybe they’re building a PAM strategy from scratch. Our pro services team supports them at every stage of their journey. Some want more hands-on control. They prefer writing their own scripts, building…


An ethical hack reveals endpoint security vulnerabilities

January 5th, 2021

“Know thy enemy and know yourself; in a hundred battles, you will never be defeated.” ~ Sun Tzu, The Art of War Sun Tzu’s advice is as applicable in cyber security as it is in battle. He warns, “When you are ignorant of the enemy but know yourself, your chances of winning or losing are equal. If ignorant…


Hardening Windows Endpoints Against Cyber Attack: Part II

December 30th, 2020

In Part I of the blog series, Hardening Windows Endpoints Against Cyber Attack, I covered the first three steps of an ethical hack. Step 0: Pre-Engagement Step 1: Passive Recon Step 2: Active Recon Now the run really begins. In this blog post, you’ll learn how to put all the knowledge you gained during the…


A look behind the scenes of a Wi-Fi Hack: What are the secrets?

December 29th, 2020

You snag a seat at your local café and open your laptop. Maybe you’re on the patio, grateful for the heater. The scent of coffee powers up your brain. The low hum of people chatting is welcome, after months of isolation. The logon page appears as you search for the Wi-Fi in your settings. Despite…


Least Privilege Examples, as told by the Three Ghosts of “A Christmas Carol”

December 24th, 2020

With the holiday season upon us, it’s a good time to settle down with a beloved story. I re-watched the Charles Dickens classic, A Christmas Carol, the other day (well, actually it was Scrooged with Bill Murray, of course) and found myself thinking about the parallels with cyber security. Really, I did. In the story,…


Hardening Windows Endpoints Against Cyber Attack: Part I

December 22nd, 2020

To secure Windows endpoints against cyber attacks, it helps to think like a cyber criminal. Cyber criminals look for the cheapest, fastest, stealthiest way to achieve their goals. Windows endpoints provide many opportunities to gain entry to IT environments and access to sensitive information. As part of the ethical hacking community, my ultimate goal is…


Consider this when switching to an IT Managed Service Provider (MSP)

December 15th, 2020

There's a significant challenge facing organizations of all sizes today. They must find and retain IT staff with yesterday's IT expertise while also becoming subject matter experts (SMEs) on tomorrow's technology. The increasing trend is for organizations of all sizes to shift some or all of their IT staff to an outsourced provider. These teams,…


Cyber Security Trends and Predictions for 2021, and Reflections on 2020

December 10th, 2020

Well, 2020 was surely a year to remember—or one that most of us will want to forget.  No one could have predicted the turn it would take, and some are still trying to decide what to do with all the toilet paper they bought (which at some point was possibly one of the highest valued…


The paradigm of effective database security is drastically changing

December 8th, 2020

The transition to cloud computing revolutionizes information technology and the delivery, management, and securing of data. Organizations are rapidly adopting cloud computing, but the evolution is ongoing, with many organizations keeping their mission-critical applications on site. There is one common concern in all organizations: security While migration to the cloud may be a cost-effective option,…


How to Protect Your macOS Endpoints with Shift from KEXT to SYSEX

December 3rd, 2020

Cue music: Ch-Ch-Cha-Changes In recent macOS releases, Apple has been drawing attention to third-party software that uses technology like kernel extensions and system extensions. This technology allows users to install components or apps that extend the native capabilities of the macOS operating system. Apple’s deprecation of kernel extensions (KEXTs) and introduction of Endpoint Security Enabled…