+1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Author Articles

How to kick start your least privilege strategy as we begin 2019

January 15th, 2019

As we open 2019, we are expecting the issue of least privilege cybersecurity to become a priority for companies across the spectrum. One of the big reasons, of course, is that 80 percent of breaches today involve the compromise of IT and business user credentials including usernames and passwords.  To combat the exploitation of compromised…


The Future of Passwords and Password Management in the Enterprise

January 1st, 2019

Passwords have been around for decades now, and they aren’t going away any time soon. And yet, password security best practices have been ignored by many. Too many people and companies are careless with password management, even though they know that a single password in the wrong hands can lead to disastrous consequences. Tempted to…


Top 5 Top Cyber Security Predictions for 2019

December 24th, 2018

Cyber security was a major topic in 2018 as the compromise of elections and voting machines was at the top of everyone’s minds. Given the critical impact of the midterm elections on future governance, election security is a major concern. It’s especially concerning after it was demonstrated at DEF CON how voting machines could be…


See Where You Place in the PAM Maturity Model

December 11th, 2018

Many companies aren’t sure how to begin their PAM implementation or which security activities have the most impact on their goals. To help you stay on course, Thycotic has developed the first PAM Maturity Model, based on industry best practices that systematically lower privileged account risk, increase business agility and improve operational efficiency. The model…


Least Privilege Uncovered

November 20th, 2018

Organizations around the world are challenged by an ever-growing cyber threat landscape and are experiencing serious cyber fatigue. Their employees are dealing with constant information overload about cyber attacks, ransomware, identity theft and phishing scams. Employees are exposed to risky behavior For years, employees across all departments in most organizations have habitually practiced risky behavior,…


Back to the Basics: Service Account Management 101

November 8th, 2018

Service accounts don’t have to be a nightmare. Get in control now.  Service accounts are typically used in operating systems to execute applications or run programs, either in the context of system accounts (high privileged accounts without any password) or a specific user account, usually created manually or during software installation.  On Unix and Linux…


Thycotic’s Strategic Alliance program means Privileged Access Management Security for everyone

October 16th, 2018

Privileged Access Management is an important and vital security solution that helps protect one of the most important assets in an organization.  Software vendors can simply enable and empower their solutions by integrating into the world’s most popular, friendly, easy-to-use and most valuable Privileged Access Management solution available. Organizations and governments around the world have…


The Black Hat 2018 Hacker Survey Report and Recap by Thycotic

September 18th, 2018

Another Black Hat conference has come and gone and more than 17,000 international security professionals converged on Las Vegas, USA to learn, share, educate and disclose security research on the latest cyber threats, attacks, vulnerabilities and techniques used to bypass the security employed by most governments and organizations globally. Of course, Thycotic’s team was there,…


BUY, BUY, BUY, BUY is sometimes not the answer!

September 17th, 2018

Strategy, vision, and innovation.  These are the key ingredients to creating software that’s good for people and business. Bomgar is desperately wanting to enter the growing Privileged Access Management (PAM) market. Originally, Bomgar started as a Secure Remote Desktop and Remote Support company in a market crowded with free and low-cost solutions.  Under pressure, Bomgar needed…


Incident Response Plan: Are You Breach-Ready?

August 28th, 2018

It’s no longer rare to see cyber-attacks in the daily news. From ransomware to data breaches to DDoS (Distributed Denial of Service) attacks, the incident is usually attributed to either cyber criminals or nation states, and almost always comes from beyond our own country’s borders and laws. Because of this, we worry about clicking on…