Contact Us +1-202-802-9399 U.S. Headquarters

Archive for the ‘Best Practices’ Category

Bangledesh Bank: Privileged Account Exposure Leads to $81 Million Loss

Thursday, April 28th, 2016

Remember the hackers that stole more than $80 million from Bangladesh Bank back in February? According to a new Reuters report, not only did they get away with a large amount of money, they may have also hacked the Society for Worldwide Interbank Financial Telecommunication (SWIFT), an organization which provides a network that enables financial […]

KuppingerCole Report: Protecting the keys to your kingdom against cyber-attacks and insider threats

Tuesday, March 8th, 2016

In November 2015, KuppingerCole released a White Paper titled “Protecting the keys to your kingdom against cyber-attacks and insider threats” outlining the state of security surrounding organizations protecting their privileged accounts throughout their organizations. In this blog post, I’d like to highlight a couple of critical points KuppingerCole makes in this report and expand a […]

Thycotic Launches Free Privileged Accounts Discovery for Windows

Tuesday, February 2nd, 2016

WASHINGTON, Feb. 2, 2016 /PRNewswire/ — Thycotic, provider of privileged account management solutions for more than 3,500 organizations world-wide, today announced that Privileged Accounts Discovery for Windows is now being offered for free. Designed with security pros, IT management and C-level executives in mind, the tool provides one collection point for all Windows privileged accounts, generates […]

5 Reasons you’ll love Thycotic’s Free Privileged Password Security Policy Template

Monday, November 16th, 2015

Privileged accounts are a favorite target for hackers—it’s critical that your organization’s IT Admins have a password protection policy in place to prevent attacks. So Thycotic and Information Shield partnered to create an easy-to-use, free password security policy template for organizations that do not yet have an official privileged account management policy. Don’t have a […]

Achieve PII Compliance Through Security Awareness Training

Monday, November 2nd, 2015

What is PII? Personally Identifiable Information (PII) is defined by the National Institute of Standards and Technology (NIST) as: Information which can be used to distinguish or trace an individual’s identity, such as their name, social security number, biometric records, etc., alone, or when combined with other personal or identifying information which is linked or […]

PAM Security Blog Series Part 5: Tips for Implementing Privileged Account Management Solutions

Tuesday, September 8th, 2015

In this video blog series, IT security experts explain why compromised privileged credentials are at the heart of most large-scale cyber-attacks, and how privileged account management can help IT teams mitigate a host of security and compliance issues. Don’t take the boil the ocean approach. Implementing a privileged account management strategy is a foundational element […]

Tips for Being A Pragmatic CSO

Tuesday, September 8th, 2015

The cybersecurity landscape is ever-changing, with new threats and technologies appearing every single day. There are more data breaches than ever, more compliance guidelines, and more new technology to secure in the workplace that has the potential to be misused by untrained employees. So why, then, does senior management tend to see security as an […]

PAM Security Blog Series Part 4: 3 Privileged Account Management Security Benefits

Tuesday, August 4th, 2015

In this video blog series, IT security experts explain why compromised privileged credentials are at the heart of most large-scale cyber-attacks, and how privileged account management can help IT teams mitigate a host of security and compliance issues. Part four of our video blog series continues as Dave and Marcus dive into the security benefits […]

PAM Security Video Series Part 2: Why Privileged Credentials Are At The Heart of Most Large-Scale Cyber Attacks

Tuesday, July 7th, 2015

In this video blog series, IT security experts explain why compromised privileged credentials are at the heart of most large-scale cyber-attacks, and how privileged account management can help IT teams mitigate a host of security and compliance issues. In our first video post for this series we debunked the common myth that passwords are dead. […]

PAM Security Video Series Part 1: Are Passwords Dead?

Tuesday, June 23rd, 2015

In this video blog series, IT security experts explain why compromised privileged credentials are at the heart of most large-scale cyber-attacks, and how privileged account management can help IT teams mitigate a host of security and compliance issues. The series starts by debunking the common information security myth – passwords are dead! Information security professionals and […]

Secret Server is the enterprise password management software that IT Admins and Security Pros love!

Try it FREE for 30 Days