+1-202-802-9399 U.S. Headquarters
Free Trial

Archive for the ‘Community’ Category

Top 4 Password Blunders And How Thycotic Can Help

Tuesday, January 24th, 2017

Guest Post from our partners at Satisnet Ltd, the leading IT Security Reseller dedicated to providing the highest level of customer care and technical support. Read the full article here. The fact is that however bad a solution they are, we are all stuck using passwords, and, with few exceptions, they will be for the foreseeable […]

Big News: UNLOCKED 2017 Official Announcement

Thursday, January 19th, 2017

Thycotic’s annual conference, UNLOCKED 2017, has been announced, and it’s bigger and better than ever before! We are thrilled to host the third annual conference again in the heart of the nation’s capital on October 19th, 2017. You won’t want to miss the largest Privileged Password Management conference of the year packed into two exciting […]

Infographic: How to Promote Information Security in the Workplace

Thursday, January 5th, 2017

We were so impressed by the important data presented in this infographic (below) by the University of Alabama at Birmingham that we’re featuring it as a guest blog post. Did you know that the biggest threat to your organization’s data/information security could be you? You, the owner. You, the senior manager. You, the hard working […]

Fortune 100 IAM Expert Shares their PAM Strategy at Gartner IAM 2016

Tuesday, November 22nd, 2016

Cyber attacks are increasing in sophistication and frequency. Traditional cyber security methods simply aren’t enough anymore; Privileged Account Management (PAM) has got to be a priority at any organization committed to data and customer security. Don’t just take our word for it! Why PAM from IAM experts Join us at Gartner IAM to hear how […]

The risks of Critical Infrastructure and IoT from DDOS attacks that could bring the Internet to a standstill

Tuesday, November 1st, 2016

Welcome to the world of IoT (Internet of Things). More and more devices get connected online every day with approximately 9 billion devices already in use.  With weak or almost no security, these devices can easily become a victim and turned into a BOT which can then be controlled and used to participate in a […]

5 Steps to Recognizing and Combating Cyber Crime

Tuesday, October 18th, 2016

Recognizing and combating cyber crime is one of the most talked about topics in the media and in the boardroom in recent years. It is a major problem and challenge for many companies with the average dwell time (average time before a company detects a cyber breach) being more than 200 days’ highlights this as […]

Cyber security Tips for Break Room and Board Room Business Leaders

Tuesday, October 11th, 2016

Everyone’s more familiar with cyber security than ever before as it’s now a frequent headline in the daily news and media. Every day we are updated about the latest cyber security breaches whether it’s Yahoo, Dropbox or LinkedIn, how many records have been stolen, or how much companies have paid in result from ransomware or […]

Top 8 Cyber Security Best Practices You Cannot Ignore

Tuesday, October 4th, 2016

With more than 3.5 billion Internet users worldwide, cyber security is a hot topic and implementing best security practices is more important than ever! The sheer volume of accounts available for hacking is jaw dropping: 6 billion email accounts 2 billion Smartphones 1 billion Apple users 1 billion Gmail accounts 1.8 billion Facebook accounts …and […]

Security Metrics Must Tell a Story That is Relevant to Your Business

Tuesday, September 6th, 2016

To help you communicate your security program’s effectiveness, I’d like to share my first-hand experiences and thoughts on why metrics are crucial to your security program and how they should be presented to your executives and board members. Metrics must tell a story Most chief executive officers (CEOs) and board-level executives assume that the security […]

3 Strategies for Helping CISOs Communicate to The Board of Directors

Tuesday, August 30th, 2016

A CISO’s ability to communicate becomes even more important when trying to get the attention of an executive board. Now that IT security is an essential part of risk management, chief information security officers (CISOs) must effectively present their case to c-level executives in order to articulate risk posture, explain strategy, or get more budget. […]