+1-202-802-9399 U.S. Headquarters

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Articles in the ‘Best Practices’ Category

Black Hat Hacker Insights: The easiest way hackers access your sensitive data

August 17th, 2017

Hackers claim that compromised privileged accounts are their quickest route to your sensitive data. We asked nearly 300 hackers “What is the fastest route to getting access to an organization’s sensitive data? The response was that it’s a toss-up between privileged accounts and compromised email accounts, both of which can hold a trove of sensitive…


Top 5 privileged account security reports CISOs must have: Who hasn’t logged in within the last 90 days?

August 16th, 2017

When you know exactly who has not used your privileged account management tool in a while you can eliminate potentially risky users who no longer need access to the tool and the privileged accounts that it protects. In this exclusive 5-part Thycotic educational series we outline the privileged account security reports CISOs must have to…


Black Hat Hacker Insights: What’s creating new opportunities for hackers?

August 15th, 2017

Fast-growing technologies are blurring the boundaries of the traditional perimeter and creating new opportunities for hackers. The traditional security perimeter protecting most organizations is proving to be an ineffective cyber security control today. Fast-growing technologies like Cloud, Mobile and Virtualization have made the boundaries of the organization blurry, and this has not gone unnoticed by…


Black Hat 2017 Survey: Hackers disclose your cyber security vulnerabilities

August 9th, 2017

With the start of Black Hat USA 2017, the annual conference turned 20, and more than fifteen thousand executives, security professionals and experts from all around the world arrived in Las Vegas to share experiences and ideas on one of the most formidable security issues facing the world today: cyber security.   It was a…


What is Biometric Authentication?

August 8th, 2017

Bio authentication, or biometric authentication, is a method of authentication (proving you are who you say you are) based on something biological to the human being.  Biometric authentication is another form of multi-factor authentication (providing several separate pieces of evidence proving who you are), and can be used in conjunction with another form of authentication,…


Top 5 privileged account security reports CISOs must have: Which privileged accounts are no longer valid?

August 1st, 2017

When you do not know which of your sensitive stored credentials are incorrect and no longer working normally, you run the risk that they will be changed outside the scope of your corporate policy by an administrator or by a malicious attacker who has breached your system. In this exclusive 5-part Thycotic educational series we…


Top 5 privileged account security reports CISOs must have: What computers in Active Directory no longer exist?

July 24th, 2017

When you know which computers in Active Directory no longer exist or have been decommissioned, you can quickly take action to protect your organization from the multitude of risks presented by unknown or unmanaged systems and accounts. Hackers target your privileged account credentials for good reason. Once they gain access, they can escalate their privileges…


Demystifying the EU General Data Protection Regulation – Let’s BUST the Myths

July 10th, 2017

Yes, you’ve all heard about it. Many companies have been raising the alarm about GDPR for months now, all offering protection and silver bullets to solve anything and everything to do with GDPR—all you have to do is install this one box. Right! It’s caused a lot of confusion and many questions, and organizations have…


Security: Powered by People

June 8th, 2017

Guest column by SailPoint. Author: Juliette Rizkallah The acceleration of cloud adoption is gaining more traction each day. If we’ve said it once, we’ve said it a thousand times, cloud is where the majority of enterprises are headed. It’s more than just your employees who are using the cloud to get things done; the cloud connects…


Part 3: How did my password get hacked? It’s this easy…

June 6th, 2017

This is the 3rd part in a 3-part series on how hackers are using simple methods to steal your passwords. In part 1 we talked about how hackers used passwords that were discovered in a previous breach in order to attempt a secondary breach. In part 2 we talked about the use of malicious scripts…