+1-202-802-9399 U.S. Headquarters
Free Trial

Archive for the ‘Community’ Category

Fortune 100 IAM Expert Shares their PAM Strategy at Gartner IAM 2016

Tuesday, November 22nd, 2016

Cyber attacks are increasing in sophistication and frequency. Traditional cyber security methods simply aren’t enough anymore; Privileged Account Management (PAM) has got to be a priority at any organization committed to data and customer security. Don’t just take our word for it! Why PAM from IAM experts Join us at Gartner IAM to hear how […]

The risks of Critical Infrastructure and IoT from DDOS attacks that could bring the Internet to a standstill

Tuesday, November 1st, 2016

Welcome to the world of IoT (Internet of Things). More and more devices get connected online every day with approximately 9 billion devices already in use.  With weak or almost no security, these devices can easily become a victim and turned into a BOT which can then be controlled and used to participate in a […]

5 Steps to Recognizing and Combating Cyber Crime

Tuesday, October 18th, 2016

Recognizing and combating cyber crime is one of the most talked about topics in the media and in the boardroom in recent years. It is a major problem and challenge for many companies with the average dwell time (average time before a company detects a cyber breach) being more than 200 days’ highlights this as […]

Cyber security Tips for Break Room and Board Room Business Leaders

Tuesday, October 11th, 2016

Everyone’s more familiar with cyber security than ever before as it’s now a frequent headline in the daily news and media. Every day we are updated about the latest cyber security breaches whether it’s Yahoo, Dropbox or LinkedIn, how many records have been stolen, or how much companies have paid in result from ransomware or […]

Top 8 Cyber Security Best Practices You Can’t Ignore

Tuesday, October 4th, 2016

Cyber Security is a very hot topic and with more than 3.5 billion Internet users worldwide. That includes, 6 billion email accounts, 2 billion smartphones, 1 billion apple users, 1 billion Gmail accounts, 1.7 billion Facebook accounts, and 300 million Twitter accounts who tweet 7,350 times per second, send 2.5 million emails per second, and […]

Security Metrics Must Tell a Story That is Relevant to Your Business

Tuesday, September 6th, 2016

To help you communicate your security program’s effectiveness, I’d like to share my first-hand experiences and thoughts on why metrics are crucial to your security program and how they should be presented to your executives and board members. Metrics must tell a story Most chief executive officers (CEOs) and board-level executives assume that the security […]

3 Strategies for Helping CISOs Communicate to The Board of Directors

Tuesday, August 30th, 2016

A CISO’s ability to communicate becomes even more important when trying to get the attention of an executive board. Now that IT security is an essential part of risk management, chief information security officers (CISOs) must effectively present their case to c-level executives in order to articulate risk posture, explain strategy, or get more budget. […]

Top 10 Questions to Ask Before Planning Your Privileged Account Management Strategy

Thursday, August 25th, 2016

  The shocking findings from the recent groundbreaking report from Thycotic and Cybersecurity Ventures highlights many companies are not doing enough to protect privileged accounts that are crucial to protecting companies from cyber-attacks. In this blog series we are going to look at some of the key findings so stay tuned. A major metric was […]

Win Big in Vegas Without Hitting the Casino with Thycotic at VMworld 2016

Tuesday, August 23rd, 2016

Thycotic attends VMworld 2016 next week with some fantastic prizes and giveaways you can’t miss! Be sure to visit booth #738 for 3 chances to win $1,000 and visit our Thycotic website to learn more about our free security tools and Identity Access Management solutions. Grab to win $1,000: Pop by booth #738 and grab […]

3 Easy Ways to Win at Black Hat 2016

Tuesday, July 26th, 2016
Thycotic attends Black Hat conference August 2016 with some fantastic prizes and giveaways you can’t miss! Be sure to visit booth #1454 for 3 ways to win and visit our Thycotic website to learn more about our free security tools and identity access management solutions. 1.      Grab to win: Pop by booth #1454 and grab [...]

Secret Server is the enterprise password management software that IT Admins and Security Pros love!

Try it FREE for 30 Days