Thycotic Telephone Number +1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Author Articles

The Top 5 Applications You Should Blacklist Now

December 13th, 2016

Most organizations regularly deploy and use applications that contain significant vulnerabilities. These vulnerabilities are easily exploited by attackers to access systems and data running on those applications. Many of the vulnerabilities known as CVE’s (Common Vulnerabilities and Exposures) are posted on the National Vulnerability Database to inform IT professionals of the mitigation controls they must…


Shamoon Cyber Attack Reinforces the Need for Privileged Password Security

December 2nd, 2016

According to reports, the Shamoon malware contained embedded credentials that allowed the malware to move throughout the network and cause harm. The attack was likely initiated using a worm, which is how Shamoon operated historically. Propagation occurs by accessing shares in the network or through other remote access, using stolen credentials. The pattern of privileged…


Protecting your network by implementing Least Privilege Policy

October 27th, 2016

If you’re still weighing up whether or not to implement the least privilege model in your organization, consider this: Cyber breaches and ransomware are a global epidemic. According to SANS: • 44% admitted one or more of their endpoints had been compromised in the past 24 months. • 85% of reported breaches involved desktops, 68%…


Measuring Security Awareness in Your Organization

September 26th, 2016

Information Security’s ability to educate and empower employees in their risk management responsibilities is a fundamental element of any business protection strategy. If employees in your company think IT Security is the owner of all security related business risk, you’re in big trouble. IT Security pros are paid to understand the range and depth of…


3 Strategies for Helping CISOs Communicate to The Board of Directors

August 30th, 2016

A CISO’s ability to communicate becomes even more important when trying to get the attention of an executive board. Now that IT security is an essential part of risk management, chief information security officers (CISOs) must effectively present their case to c-level executives in order to articulate risk posture, explain strategy, or get more budget.…


10 Questions the Board of Directors Should Ask About Cybersecurity

June 7th, 2016

Corporate directors play an important role in ensuring their companies have sufficient policies and resources in place to address IT security and to respond in the event that the company suffers a cyber-attack. Board of directors should demand to receive appropriate and timely information to help them fulfill their oversight role in managing cyber risk.…


How Security Can Make IT More Productive

May 31st, 2016

In their Technology Spotlight, IDC examined issues around security and the undergoing transformation from negative to positive and from obstructionist to an enablement role. The paper also highlighted how Thycotic solutions play in addressing associated challenges. According to IDC, Privileged Access Management (PAM) is foremost on the minds of enterprises as they defend against credential…