+1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Articles in the ‘Industry News’ Category

Could basic password security practices have helped prevent the latest Equifax lawsuit?

November 7th, 2019

Fallout from the 2017 Equifax data breach is back in the news as a new class-action suit consolidated 373 previous lawsuits into one. Unlike previous lawsuits filed by Equifax customers, the latest action comes from shareholders that allege the company didn’t adequately follow or disclose security practices, including poor password management. If you google, “what…


Why Usable Security Should Drive Your Decision in Selecting a PAM Tool for Your Organization

November 5th, 2019

What is Usable Security At Thycotic ease of use has been a consistent focus with our products, but we have started to use the term Usable Security more frequently. Usable security is much more than a Thycotic marketing term. Usable security is an academic field of study that evaluates the usability of computer security. We…


Limit access for third-party vendors without restricting their ability to get work done

October 22nd, 2019

Companies often work with outside experts, consultants and other third-party vendors who need privileged access to corporate resources. These third-party entities can’t do what they were hired to do if their access is too restrictive. You can’t maintain a strong security posture if access and oversight are too lax. How do you, a security professional,…


SWIFT Controls, Cyber Crime and Privileged Access Management: Securing Banking and Finance

October 15th, 2019

The Society for Worldwide Interbank Financial Telecommunication (SWIFT) provides financial messaging services to banks, financial institutions and corporations all over the world. The technology is used to exchange sensitive information about financial transactions by more than 11,000 customers in over 200 countries. Financial institutions: a major target for cyber criminals; a critical subject for security…


The Real Cost of PAM Software

October 1st, 2019

A low price tag for PAM software doesn’t necessarily mean it’s the best overall value. Enterprise-scale PAM, like most software purchases, typically involves more than the initial license fee. Depending on your security goals, internal resources, and specific IT environment, you may need to plan for additional costs. It’s important to identify the total cost…


Privileged Access Management Best Practices

September 24th, 2019

For the past two years, Gartner has named privileged access management (PAM) the top IT security priority. Privileged account credentials for domain admins, service, application, and root accounts are valuable targets. When attackers gain these credentials, they can exploit your most sensitive information and critical systems. Privileged access gives them power to alter data, change…


New Product Launch! Thycotic Connection Manager centrally manages multiple remote sessions and integrates with Secret Sever for vaulted credentials

September 17th, 2019

Connection Manager provides centralized management of multiple remote sessions Connection Manager is an advanced remote connection management solution that provides one place to manage and interact with multiple remote sessions. Connection Manager can scale across hundreds of different connections to improve productivity, strengthen security and tighten compliance. With the release of Connection Manager, tight integration…


Secret Server product update: Conquer common cloud challenges with the release of Secret Server 10.7

September 12th, 2019

With this newest release, Secret Server not only further strengthens its PAM cloud leadership, but also its overall enterprise readiness and usability. With Secret Server 10.7, users can now: Discover, manage, and delegate access for Amazon AWS privileged accounts Use Secret Server’s command line interface (CLI) from Windows, Mac, and Linux/Unix workstations Meet even the…


Before the Breach: Leveraging PAM and VPAM solutions to protect privileged credentials

August 27th, 2019

This is a guest blog written by Tony Howlett, CISO at SecureLink. Tony is a published author and speaker on various security, compliance, and technology topics. He also serves as President of (ISC)2 Austin Chapter and is an Advisory Board Member of GIAC/SANS. CISOs and their security teams have an impossible task; they must predict…


Service Account Governance: Reduce your attack surface with Account Lifecycle Manager

August 20th, 2019

Service accounts abound in every organization. Failure to manage them leads to significant risk. This has been a critical issue for organizations that use Active Directory and have grown to a level that accounts can no longer be managed by hand. Almost all medium to large organizations suffer from extreme service account sprawl, perpetuating the…