+1-202-802-9399 (US)

Thycotic’s Cyber Security Publication

FEATURED STORY:
How to get your entire company on board with Privileged Access Management

What Blue Cross Blue Shield Louisiana looked for in a PAM solution

Filter by Tags: 

Facebook Password Breach: What You Need to Know

March 22nd, 2019

Yesterday Facebook disclosed during a routine security review they discovered “some” user passwords were being stored unencrypted, but the passwords were not visible to anyone outside of Facebook. Facebook’s definition of “some” doesn’t really illustrate the full magnitude of this event. We are talking hundreds of millions of users that are affected. False Reassurance Facebook…


Gartner Peer Insights Customers’ Choice for Privileged Access Management: The 10 Most Impressive Customer Stories To Us

March 21st, 2019

We are honored to announce that we have been recognized as a March 2019 Gartner Peer Insights Customers’ Choice for Privileged Access Management. In its announcement, Gartner explains, “The Gartner Peer Insights Customers’ Choice is a recognition of vendors in this market by verified end-user professionals, taking into account both the number of reviews and…


Cyber Security Incident Response and Reporting Process

March 19th, 2019

Ever since we launched our customizable cyber security incident response template, I’ve been amazed by its volume of downloads. I quickly realized that the increasing cyber threats from criminal hackers, malware and ransomware is starting to be taken seriously by organizations large and small, and that there is a growing demand for guidance and information…


New Hire Onboarding Checklist: A CISO’s Perspective

March 12th, 2019

When a new employee enters an organization there are various behind-the-scene activities that must take place to ensure the new hire an efficient onboarding experience. Many are administrative in nature and are taken care of by HR. But then there are those related to cyber security—and they are far too often overlooked. As a security…


Complete Guide to leveraging Session Recording to Improve Accountability and Meet PCI Compliance

March 5th, 2019

You’ve set up policies. You’ve trained your team. You’ve vetted third parties. But, even the most proactive privilege security strategy can’t account for every situation and every type of risky behavior.   Today many Thycotic customers rely on session recording and monitoring capabilities for added peace of mind. If any privileged user adds a backdoor account or makes an unauthorized configuration change,…


Joseph Carson’s Top 5 Sessions to Attend at RSA Conference 2019

February 26th, 2019

RSA Conference 2019 will take place March 4th – 8th in San Francisco at the Moscone Center.  The theme this year is ‘Better’. Not exactly a warm, exciting theme for security professionals—it implies that we need to do better and work harder. My mind always tells me to work smarter and stay focused.  But there’s…


Usable Security in Secret Server 10.6 Addresses Top Pain Points of IT Ops

February 21st, 2019

IT Ops teams have spoken, loud and clear. Their top goals for Privileged Access Management are increasing automation and ease of deployment. Over one third of respondents in Thycotic’s recent IT Ops Survey say PAM software that’s “too complex for daily use” hinders its effectiveness. We couldn’t agree more. Secret Server 10.6 is an innovative…


The new cloud security question PAM experts need to answer

February 19th, 2019

Enterprises are no longer asking, “is the cloud secure?” with the same anxiety and fear they expressed just a few years back. As long as cloud-based IT resources are protected in a highly secure environment (such as SOC2 data centers) and demonstrate advanced security controls, enterprises have gotten on board the cloud train. The pace…


Actions CISOs Must Take to Overcome Negative Perceptions

February 12th, 2019

Chief Information Security Officers (CISOs) shoulder tremendous responsibility. They’re ultimately responsible for their company’s cyber security posture. At the same time, the security decisions they make also impact core business metrics such as productivity, cost savings, revenue growth, and brand perception. The world of today’s CISOs is a balancing act. On one hand, they are…


How the just-released Forrester Wave PIM Q4 2018 Report can help you find the right PAM vendor

February 5th, 2019

As awareness about the importance of Privileged Access Management (PAM) and Privileged Identity Management (PIM) increases, (Gartner called it a top priority for cyber security in 2018), executives, IT security and operations teams are evaluating multiple options when selecting a PAM or PIM solution that would be best for their organizations. That means independent analysis…