Phone Number +1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Articles in the ‘Free How-To Tech Advice’ Category

Privileged Identity Management (PIM) and Identity-Centric Security Controls

April 1st, 2021

The number of identities in the enterprise is exploding. Gaining control of identities related to people as well as machines is a challenge for many organizations. You need to know who your users are and what they do. If you experience a security incident, you must be able to reverse engineer who did what in…


Securing and Hardening Linux and Unix Endpoints Against Cyber Attack: Part IV

March 30th, 2021

This post is part of a series on securing your endpoints against cyber attacks. Read: Part I | Part II | Part III | Part IV How Secure are your Linux Endpoints? An Ethical Hacker’s Guide to Securing and Hardening Linux and Unix Endpoints Welcome to the next post in our series on hardening and…


Securing and Hardening Linux and Unix Endpoints Against Cyber Attack: Part III

March 23rd, 2021

This post is part of a series on securing your endpoints against cyber attacks. Read: Part I | Part II | Part III | Part IV How Secure are your Linux Endpoints? An Ethical Hacker’s Guide to Securing and Hardening Linux and Unix Endpoints Welcome to the next post in our series on hardening and…


Active Directory Security and Hardening: An Ethical Hacker’s Guide to Reducing AD Risks

February 23rd, 2021

Approx. reading time: 8-10mins  This blog is intended for: IT and System Admins IT Security IT Auditors Pen Testers Tech Geeks Anyone moving into a career in Cybersecurity Skip to most common Active Directory misconfigurations In this post, we’re going to focus on common cyber-attacks that target Active Directory (AD). Active Directory is deployed across…


Defense-in-depth with Overlapping Rings of Endpoint Security

February 16th, 2021

Defense-in-depth with overlapping rings of endpoint security When a cyber criminal wants to break into your network, the number one way they succeed is by attacking endpoints. Cyber criminals break into one endpoint and then use the passwords found there, and the privileges they provide, to move laterally from the endpoint onto your network. Endpoint…


Enterprise Endpoint Management is a Must When All Users are Privileged Users

January 26th, 2021

A newly released eBook, The Definitive Guide to Endpoint Privilege Management (EPM), makes a strong case for why vulnerable endpoints must be secured from the perspective that all users are privileged users. In the guide’s Foreword, I emphasize that user identity has become the new “perimeter” of cyber security. That’s because a single compromised credential…


An Ethical Hack Reveals Endpoint Security Vulnerabilities

January 5th, 2021

“Know thy enemy and know yourself; in a hundred battles, you will never be defeated.” ~ Sun Tzu, The Art of War Sun Tzu’s advice is as applicable in cyber security as it is in battle. He warns, “When you are ignorant of the enemy but know yourself, your chances of winning or losing are equal. If ignorant…


Hardening Windows Endpoints Against Cyber Attack: Part II

December 30th, 2020

This post is part of a series on securing your endpoints against cyber attacks. Read: Part I | Part II | Part III | Part IV In Part I of the blog series, Hardening Windows Endpoints Against Cyber Attack, I covered the first three steps of an ethical hack: Step 0: Pre-Engagement Step 1: Passive…


A look behind the scenes of a Wi-Fi Hack: What are the secrets?

December 29th, 2020

You snag a seat at your local café and open your laptop. Maybe you’re on the patio, grateful for the heater. The scent of coffee powers up your brain. The low hum of people chatting is welcome, after months of isolation. The logon page appears as you search for the Wi-Fi in your settings. Despite…


Least Privilege Examples, as told by the Three Ghosts of “A Christmas Carol”

December 24th, 2020

With the holiday season upon us, it’s a good time to settle down with a beloved story. I re-watched the Charles Dickens classic, A Christmas Carol, the other day (well, actually it was Scrooged with Bill Murray, of course) and found myself thinking about the parallels with cyber security. Really, I did. In the story,…