Phone Number +1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Author Articles

Why are security and business goals at odds with each other?

December 24th, 2019

Few jobs are more challenging than that of a CISO. Constantly on call and under intense pressure, they’re not only keeping critical systems running and sensitive data protected, but also working to uphold a rapidly evolving list of regulatory demands. Yet CISOs and their teams do much more than act as the company ‘bodyguard’. They…


Thycotic’s Cyber Security Predictions and Trends for 2020

December 12th, 2019

Which cyber security predictions or trends do you think will become reality? 2019 has been an exciting and interesting year for those of us with an interest in cyber security.  The topic is top of mind for governments and business leaders around the world as they wrestle with the ever-evolving challenge of reducing cyber-attack risks.…


Privileged Access Management 2019: A Year in Review

November 19th, 2019

Another year has passed, and cyber attacks did not take a vacation or enjoy any time off. Cyber attacks wreak havoc on businesses 24/7. And cyber threats constantly increase and evolve, so organizations must adapt to become resilient to the newest threats. Not all successful cyber attacks are sophisticated This year confirmed that not all…


Service Account 201: Service Accounts in the Cloud

November 12th, 2019

I wrote about the basics of service account management in Back to Basics: Service Account Management 101.  Before I dive into service accounts in the cloud, here's a quick recap of that post. A quick recap on Service Accounts 101 What exactly are service accounts and why are they needed?  Most organizations have two types…


Trick or Treat? Stay safe during National Cybersecurity Awareness Month in October, and beyond

October 8th, 2019

Ah, October! Summer has officially come to an end and we’ve quickly moved on to jumpers, football, and pumpkin everything. October is also National Cybersecurity Awareness Month. The theme for 2019 is “Own IT. Protect IT. Secure IT.”  But it needn't be scary, and the tricks or treats you get at the end of the…


Can PAM Coexist with the Zero Trust Security Model?

September 26th, 2019

What is the Zero Trust security model and why was it introduced? The concept of Zero Trust security isn’t new; the term was coined by Forrester back in 2010 and was initially synonymous with a network security approach known as micro-segmentation. Micro-segmentation is a way to create secure zones in data centers and cloud deployments…


The Black Hat 2019 Hacker Survey Report and Black Hat / Defcon 27 Recap

September 5th, 2019

Brought to you by Thycotic Well folks, Black Hat 2019 conference has come and gone. Around 19,000 InfoSecurity professionals from around the world came to Las Vegas to learn, share, educate and disclose security research on the latest vulnerabilities, cyber threats, cyber attacks and techniques used to bypass popular cyber security methods—the same methods used…


Top 5 Black Hat 2019 Sessions Not to Miss. Plus: Bonus Travel Tips to Hacker Cons

August 1st, 2019

The Black Hat USA 2019 conference is about to start. Over 17,000 security professionals will come from all around the world to Las Vegas, USA. They will learn, share, educate and disclose security research on the latest cyber-threats and attacks, vulnerabilities, and techniques used to bypass security used by most governments and organizations globally. Without…


Key Takeaways from the 2019 Verizon Data Breach Investigations Report

May 21st, 2019

The Verizon Data Breach Investigations Report 2019 is now publicly available to download or read online. It’s the 12th edition, and not surprisingly, it reveals that cyber criminals are still successfully using their hacking techniques—many of which are very common—and that we have failed to stop them. However, we are getting better at stopping them.…


How to Remove Admin Rights Without Reducing Productivity

April 9th, 2019

This is a guide to the risks associated with admin rights and over-privileged users, and how to remove admin rights in order to reduce those risks.  There are many options for removing administrator rights, however you must always consider business operation—removing admin rights should never jeopardize productivity.  Why do organizations use admin rights in the…