
Many companies aren’t sure how to begin their PAM implementation or which security activities have the most impact on their goals. To help you stay on course, Thycotic has developed the first PAM Maturity Model, based on industry best practices that systematically lower privileged account risk, increase business agility and improve operational efficiency. The model…
In the past, Privilege Access Management (PAM) was accessible only to large enterprises with skilled IT teams. Feature-heavy PAM tools became more and more complex and expensive to manage. Meanwhile, security-conscious small and medium businesses were relegated to using password tools designed primarily for consumers. While consumer password tools provide a “password vault” to store…
It’s no longer rare to see cyber-attacks in the daily news. From ransomware to data breaches to DDoS (Distributed Denial of Service) attacks, the incident is usually attributed to either cyber criminals or nation states, and almost always comes from beyond our own country’s borders and laws. Because of this, we worry about clicking on…
The US midterm elections campaigns are well under way and expected to be held on Tuesday, November 6, 2018. This midterm election is significant as it will take place right in the middle of President Trump’s first term and will likely be an indicator of the US citizens’ confidence in both the President and the…
Cyber criminals don’t want to be found. They play a great game of hide and seek, and in many companies—no one is doing any seeking. Instead, they hope that their security perimeter is holding strong, typically relying on traditional cyber security controls that are usually outdated and, for most cyber criminals, easily bypassed using phishing…
Guest post from Alpha Generation a Thycotic certified partner who specializes in IT distribution with a focus on proactive security in the UK. As you’d expect, we think the right technology is a critical part of IT security. Tools for Privileged Account Management (PAM) are a vital addition to your security stack, protecting against threats that firewalls and antivirus…
Author Note: These are all 3rd party tools that have been recommended to me by peers and experts in the field. With that said, Thycotic does NOT endorse any of these: please explore and use at your own risk. Email Encryption Tool OpenPGP – An open source encryption protocol used by many clients for providing…
These days Privileged Access Management and Privileged Account Management (PAM) are interchangeable terms that get a lot of attention. There’s a reason why PAM is fast becoming a top-of-mind cybersecurity issue: up to 80% of cybersecurity breaches are associated with the abuse or misuse of privileged account credentials. And these credentials readily give hackers or…
Today we are truly living in the world of IoT—the Internet of things—with approximately 9 billion things, or devices, connected to the internet, many of which are powering and enabling our critical infrastructure. Every day billions of employees power up their devices and connect to the internet to plug into their everyday world, all of…
We’re constantly fighting an awareness battle in getting IT professionals and business stakeholders to appreciate the urgency associated with securing Privileged Account credentials. With so many high-profile breaches accomplished through the compromise of user passwords and escalation to access privileged accounts, security pros and IT directors are looking for simple ways to educate people throughout…