Phone Number +1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Articles in the ‘Industry News’ Category

Think Differently About Unix / Linux Privilege Management

June 30th, 2020

Security models have struggled to match the evolution of Unix. Over its long history, Unix has evolved and changed in many different ways. What started in Bell Labs 40 years ago has spawned more than 150 variants of Unix in use today. Unlike the linear progression of Windows operating systems, in which most organizations use…


Endpoint Security Demands a Defense-in-depth Strategy

June 16th, 2020

Endpoints, the devices people use to access company resources, are a weak spot in corporate security. Compromised endpoints are a primary access point that cyber criminals use to infiltrate a network. Two-thirds of companies are compromised by exploits that originate with an endpoint. The volume of endpoint attacks is rising, as is the sophistication of…


A New Approach to Modern Enterprise Access Management

June 4th, 2020

Earlier this week, we publicly announced the acquisition of Onion ID—a San Francisco-based identity and privileged access management (PAM) company. The acquisition marks a significant milestone in Thycotic’s strategic direction as a PAM company. Over the past several years, we have driven innovation through a multi-stage product roadmap designed to help companies adopt PAM and…


10 Features Every Privileged Access Management Solution Must Have

May 26th, 2020

The MoSCoW method is a prioritization technique used in project management and software to prioritize requirements. It stands for: Must have, Should have, Could have, and Won't have. Using this approach can help you build a common understanding among your stakeholders as you evaluate and select a privileged access management (PAM) solution. In this blog, we’ll focus on the 10…


How can you prevent insider threats when none of your insiders are actually “inside”?

May 12th, 2020

Security teams can be so focused on blocking cyber attacks from outside that they turn a blind eye to potential threats within their own organizations. In fact, 34% of all breaches are caused by insider threats. Insider threats are uniquely difficult to defend against because insiders inherently require an elevated level of trust and access…


How Do Passwords Work?

May 7th, 2020

If you want to make a purchase, post a comment in a forum, or even read content on many websites, you’re prompted to create (and remember!) a password. What’s going on when you create a password? And how does this process help keep your information safe? When you create a password on a website, that…


Building the Case for Privileged Session Management

March 17th, 2020

You simply can’t be everywhere at once. How can you keep tabs on your most sensitive and critical systems? If only you had eyes in the back of your head. Even organizations with well-documented PAM policies don’t simply trust that people are doing the right things Privileged session management increases oversight and accountability so you…


Best Practices and Cyber Security Tips for Working Remotely

March 16th, 2020

Given the unusual recent circumstances, many employees around the world are finding themselves in a situation where they must work from home or remotely. I’ve been working remotely for about 15 years, so I thought it would be great to share some of my experiences, cyber security best practices and tips, and lessons learned on…


Lessons we’ve learned: the EU NIS directive and securing critical infrastructure

March 10th, 2020

What is NIS? The Networks & Information Systems (NIS) Directive was created by the European Union (EU) with the specific aim of raising levels of overall cyber security and network resilience for critical infrastructure. NIS improves overall EU cyber security by driving organizations to adopt enhanced security for critical infrastructure. The NIS Directive & Critical…


A Guide to Managing and Securing Privileged Users

March 3rd, 2020

Organizations often have two to three times more privileged user accounts than individual employees. Securing these special accounts is vital to protecting sensitive information and critical systems from cyber attack. To help people stay productive, you must provide appropriate access for privileged users while also minimizing risk. Privileged users require special handling, training, and oversight.…