Phone Number +1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Author Articles

Privileged Access Management Expertise Boosts Your Cyber Security Career

July 7th, 2020

Shortage of cyber talent is a top concern for 63% of senior executives, according to a recent Gartner survey. The number of unfilled cyber security positions is over four million, up from 2.9 million last year, says the latest (ISC)2 Cybersecurity Workforce Study. This includes 561,000 in North America, 291,000 in Europe, and a staggering…


How can you prevent insider threats when none of your insiders are actually “inside”?

May 12th, 2020

Security teams can be so focused on blocking cyber attacks from outside that they turn a blind eye to potential threats within their own organizations. In fact, 34% of all breaches are caused by insider threats. Insider threats are uniquely difficult to defend against because insiders inherently require an elevated level of trust and access…


Thycotic named leader in new KuppingerCole Leadership Compass

May 8th, 2020

Why innovation has become so important to Privileged Access Management As noted in the 2020 KuppingerCole Leadership Compass, Privileged Access Management (PAM) is one of the fastest growing areas of cyber security today. Forty PAM vendors now compete for annual revenues that will total $2.2 billion this year and will more than double to $5.4…


Privileged Access Management: The Great Cloud Migration

March 31st, 2020

Migrating your PAM instance to the cloud can look from the outset like a pretty daunting task. How, exactly, do you go about transporting what may be years of data and highly sensitive information to a new home? It’s often said that migrating to the cloud is like moving houses, and that’s one of the…


A Guide to Managing and Securing Privileged Users

March 3rd, 2020

Organizations often have two to three times more privileged user accounts than individual employees. Securing these special accounts is vital to protecting sensitive information and critical systems from cyber attack. To help people stay productive, you must provide appropriate access for privileged users while also minimizing risk. Privileged users require special handling, training, and oversight.…


PAM and AWS: Keeping pace with AWS privileged accounts

February 4th, 2020

Amazon Web Services (AWS) gives IT and development teams tools to move fast and change direction on a dime. Privileged accounts for AWS resources are created quickly and may be abandoned just as quickly. With such a fluid process, it’s difficult for security teams to stay on top of how many privileged accounts have access…


PAM in the cloud vs. PAM for the cloud. What’s the difference?

November 26th, 2019

“Are you talking about PAM in the cloud or PAM for the cloud?” “Wait, what’s the difference?” We hear these questions a lot from our customers. And, we have to admit the “PAM in the cloud vs. PAM for the cloud” debate has caused some confusion even in our internal meetings. Cloud has exploded. Simply…


Could basic password security practices have helped prevent the latest Equifax lawsuit?

November 7th, 2019

Fallout from the 2017 Equifax data breach is back in the news as a new class-action suit consolidated 373 previous lawsuits into one. Unlike previous lawsuits filed by Equifax customers, the latest action comes from shareholders that allege the company didn’t adequately follow or disclose security practices, including poor password management. If you google, “what…


Limit access for third-party vendors without restricting their ability to get work done

October 22nd, 2019

Companies often work with outside experts, consultants, and other third-party vendors who need privileged access to corporate resources. You may be engaging with third-party vendors in a number of different ways, such as a remote contractor working on a time-limited project, an embedded contractor, or outsourced staff augmentation. These third-party entities can’t do what they…


The Real Cost of PAM Software

October 1st, 2019

A low price tag for PAM software doesn’t necessarily mean it’s the best overall value. Enterprise-scale PAM, like most software purchases, typically involves more than the initial license fee. Depending on your security goals, internal resources, and specific IT environment, you may need to plan for additional costs. It’s important to identify the total cost…