+1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Articles in the ‘How To & Guides’ Category

Everything you need to know about NIST 800-53

June 19th, 2018

The National Institute of Standards and Technology (simply referred to as NIST) sets the security standards, guidelines and recommended security controls for the Federal Information Systems and Organizations.  This extensive database of publications includes the FIPS (Federal Information Processing Standards), SP (NIST Special Publications), NISTIR (NIST Internal Reports) and the ITL Bulletin (NIST Information Technology…


What Every CISO Wants Their Employees to Know About Cybersecurity

May 15th, 2018

CISO’s have an incredibly important role to fill. One of their biggest responsibilities is empowering employees to recognize and understand how to respond to cyber attacks they face in their daily work and personal lives. With cybersecurity fatigue, it can be difficult to decide which information to focus us. In this video, you will learn…


Cybersecurity for Dummies Part 2: Responding in the Wake of a Cyber Attack

February 2nd, 2018

With cyber threats, it’s a matter of when and not if you’re going to be impacted. Some attacks are within your control, and some aren’t, so you need to be prepared for what to do when you do become a victim. Understanding the method of threats you face can help you identify any hack or…


Cybersecurity for Dummies Part 1: Making Cybersecurity Everyone’s Responsibility

January 30th, 2018

In our always-connected world where the private information of individuals and organizations is vulnerable to exposure and misuse, cybersecurity is everyone’s responsibility because hackers or malicious threat actors who steal proprietary information don’t care about age, gender, race, culture, beliefs, or nationality. They probe your digital footprint and your Internet-connected computers based on opportunity, often…


How to Crack an Active Directory Password in 5 Minutes or Less

October 12th, 2017

Guest column by Semperis. Author: Noa Arias, Director of Marketing at Semperis The massive Equifax data breach compromised sensitive information for roughly 143MM people and is a sobering reminder that security flaws still exist in most organizations. The fact is that most enterprises use Active Directory as the cornerstone of their IT systems and, while AD can…


The Anatomy of a Privileged Account Hack: everything you need to know to protect your organization

October 6th, 2017

Not all hacks, or data breaches, are equal. While many breaches result in inconvenience and minor financial losses, others have the potential to devastate your organization’s finances, credibility, privacy, ability to meet compliance, and much more. A privileged account hack falls into the second category. Our white paper, The Anatomy of a Privileged Account Hack,…


Integrate the Thycotic Mobile App with Your EMM Solution Instantly

September 28th, 2017

Secure your employee's BYOD devices before loading Thycotic applications Thycotic has joined forces with AppDome so our customers can easily integrate the Thycotic mobile app with an Enterprise Mobility Management (EMM) solution of their choice. EMM enables IT organizations to manage and secure company data on mobile devices. There are several EMM solutions available including…


How Does Encryption Work? A Look at Symmetric and Asymmetric Encryption

June 12th, 2017

Today we're talking about encryption, but not salting or hashing, even though the two are often associated with one another when storing things like passwords in a secure manner. They are actually very different, and this post focuses on encryption. A Quick Overview of Encryption Encryption is a method of turning data into a form…


An Introduction to Business Networks 101

June 2nd, 2017

If you’re exploring getting into network administration, either for your personal education (such as a college degree) or as a career change, you’re in the right place.  When it comes to understanding the more complex aspects of network administration, such as cyber security, it’s best to start at the beginning. In order to learn how…


Part 2: How did my password get hacked? It’s this easy…

May 24th, 2017

I’ll pick up where we left off in Part 1: How did my password get hacked? That’s where I explained that the reason your account was hacked was probably NOT due to some sophisticated state actor from China or Russia. So to recap, the top three reasons your password was hacked were most likely: You had a different account…