+1-202-802-9399 U.S. Headquarters

Thycotic’s Cybersecurity Publication

FEATURED STORY:
5 Shocking Insights into the Social Network Habits of Security Professionals 

Hacking social media accounts has never been easier. Attackers take advantage of poor password hygiene and usually hijack an account and hold it for ransom. It’s difficult to get the real picture, but according to Facebook, accounts are hacked 600,000 times a day. And even worse, 80% of all cyber security attacks involve a weak or stolen password.

Filter by Tags: 

Don’t Let Malware Hit You on the Way Out

September 19th, 2017

Guest column by Semperis. Author: Noa Arias, Director of Marketing at Semperis When it comes to the threat of data breach, it’s well known that current employees can be an organization’s weakest link. What about former employees? So many companies have strict new hire processes in place to onboard new employees, but there’s still a…


Equifax: What you need to do right now

September 14th, 2017

The news of the mega breach at Equifax is significant not just because of the size of the breach, but due to the sensitivity of the information stolen which ultimately enables cyber criminals to target their victims on multiple fronts including but not limited to Identity Theft, Financial Fraud or changing existing information or security…


Get the best privileged account management tips from the world’s top experts

September 13th, 2017

Whether you are a customer of Thycotic or not, if you can get to Washington D.C. this October, you are not going to want to miss UNLOCKED. UNLOCKED is our annual security conference where people from all around the country travel for two things: 1. Hear from industry experts and leaders on what they’re doing…


6 Things Every CIO and CISO Should Know

September 12th, 2017

Guest column by SailPoint. Author: Darran Rolls The relationship between the CIO and CISO is often seen as one that is complicated by conflicting priorities. CIOs are under pressure to drive business solutions faster than ever, so the risk mitigation that the CISO seeks to achieve often creates an imbalance between the two – security…


What is PuTTY and what’s new with it in 2017?

September 7th, 2017

  What is PuTTY? PuTTY is an open source application that allows you to connect remotely to many different types of systems, over various communication protocols.  However, PuTTY is most famously used for SSH connects from Windows systems to Unix based systems.  This application allows you to connect your private SSH keys and enter passphrases…


Top 5 privileged account security reports CISOs must have: What Privileged Account passwords are expiring this week?

August 31st, 2017

How do you know when a password is about to be changed according to an assigned password rotation interval? Or when a privileged account or any other item stored within your privileged account management tool is reaching the end of its validation period and needs to be renewed? In this exclusive 5-part Thycotic educational series…


Top 5 privileged account security reports CISOs must have: What is the status of your privileged account password policy compliance?

August 28th, 2017

Do you know an IT security professional who would NOT want an at-a-glance view of all the credentials being managed by their privileged account management tool, and absolute assurance that they adhere to the organization’s assigned policy requirements? I think not. In this exclusive 5-part Thycotic educational series we outline the privileged account security reports…


SANS 2017 Threat Landscape: highlights of the cyber threat survey

August 24th, 2017

The latest SANS 2017 Threat Landscape Survey has been released—the theme of the survey is ‘Users on the Front Line’. In summary, the survey results indicate that Endpoints and Users are on the front line in the battle against cyber threats. This reiterates Thycotic’s message that the traditional cyber security perimeter is no longer the…


Passwords and Biometrics. Can they coexist, and should they?

August 23rd, 2017

The vision of a biometrics-led future for IT security is breathtaking, but is there a place in the future for passwords? Or are passwords ancient history? Passwords Need Better Management, Not Replacement Forget your passwords. They’re ancient history. That’s the message you’ll increasingly see if you keep up with the latest developments in security. But…


Black Hat Hacker Insights: The easiest way hackers access your sensitive data

August 17th, 2017

Hackers claim that compromised privileged accounts are their quickest route to your sensitive data. We asked nearly 300 hackers “What is the fastest route to getting access to an organization’s sensitive data? The response was that it’s a toss-up between privileged accounts and compromised email accounts, both of which can hold a trove of sensitive…