+1-202-802-9399 (US)

Thycotic’s Cybersecurity Publication

FEATURED STORY:
Cyber Security Responsibilities: Who owns your organization’s PAM Policy Template? 

Who is responsible for creating, implementing and overseeing your organization’s Privileged Account Management Policy template? And what is at risk if no individuals or departments are named to ensure that your users and systems are in compliance with your PAM Policy?

Filter by Tags: 

Everything you need to know about NIST 800-53

June 19th, 2018

The National Institute of Standards and Technology (simply referred to as NIST) sets the security standards, guidelines and recommended security controls for the Federal Information Systems and Organizations.  This extensive database of publications includes the FIPS (Federal Information Processing Standards), SP (NIST Special Publications), NISTIR (NIST Internal Reports) and the ITL Bulletin (NIST Information Technology…


Gartner: Privileged Access Management is the #1 Cyber Security Priority for 2018

June 11th, 2018

A recent report from Gartner reveals the top IT Security Projects for 2018 with Privileged Access Management as #1, Application Control #4 and Protecting Endpoints #6. Before we get into why Privileged Access Management (PAM) is the #1 Cyber Security Priority in 2018, let’s take a quick look at what lead up to this change…


Why Knowledge is Power In PAM

June 7th, 2018

Guest post from Alpha Generation a Thycotic certified partner who specializes in IT distribution with a focus on proactive security in the UK. As you’d expect, we think the right technology is a critical part of IT security. Tools for Privileged Account Management (PAM) are a vital addition to your security stack, protecting against threats that firewalls and antivirus…


Infosecurity Europe kicks off in London on June 5. Here’s how you’ll get the most out of it

June 5th, 2018

It’s the beginning of June and that means one thing in the cyber security professional’s calendar: Infosecurity Europe is here. Infosecurity Europe  is one of the largest cyber security events in Europe with over 400 exhibitors gathering to show off the latest in cyber security defense (and also some offensive capabilities) to about 20,000 cyber…


European Identity & Cloud Conference 2018: The Place Where the Digital Transformation is Alive

May 31st, 2018

Exhibitions and conferences focusing exclusively on the management and security of digital identities are rare in Europe. The European Identity & Cloud Conference, which leading analyst firm KuppingerCole has been organizing in Munich for twelve years now, is therefore even more important for the industry. Every year the EIC agenda focuses on the latest and…


2018 Cyber Security Breaches: Client Concerns, Opportunities for Solution Providers

May 29th, 2018

Cyber-criminal groups have an extensive arsenal of surveillance and research methodologies they use to search for even the smallest of vulnerabilities in your cyber security protections—vulnerabilities that enable them to infiltrate your organization, gather intelligence and access your systems. Thycotic’s 2018 Global Channel Partner Survey Report indicates that these cyber-criminals are largely successful. If your…


Thycotic and AusCERT – Building Resilience

May 22nd, 2018

Free up your calendar! Thycotic will be participating at the 17th Annual AusCERT Cyber Security Conference, running across three days, May 29 – June 1, 2018. Together, Thycotic and master distributor, emt Distribution will be arriving at Queensland’s Gold Coast, Surfers Paradise Marriott, ready to discuss your most pressing Privilege Access Management pains. The AusCERT…


What Every CISO Wants Their Employees to Know About Cybersecurity

May 15th, 2018

CISO’s have an incredibly important role to fill. One of their biggest responsibilities is empowering employees to recognize and understand how to respond to cyber attacks they face in their daily work and personal lives. With cybersecurity fatigue, it can be difficult to decide which information to focus us. In this video, you will learn…


Complexity kills. Simplicity succeeds: Why Thycotic beats CyberArk in new vendor evaluation

May 10th, 2018

A new vendor evaluation analyst report from the UK-based Cyber Management Alliance, puts Thycotic’s Privileged Access Management solution—Secret Server—at the top of its Leaderboard, ahead of the traditional 800-pound gorilla in the PAM space, CyberArk. Based on an extensive evaluation list of criteria, the CM-Alliance makes very clear why Thycotic tops their preferred vendor list. …


Seven reports you can share with auditors and execs to demonstrate proactive privilege management

May 8th, 2018

All major compliance bodies recommend or require a least privilege policy to protect sensitive data. Removing local administrative access on user workstations is a fundamental strategy for endpoint security to protect against both internal and external threats. Auditors will see that you have implemented a proactive security strategy to prevent malicious activity and accidental data…