Phone Number +1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Articles in the ‘Industry News’ Category

Consider this when switching to an IT Managed Service Provider (MSP)

December 15th, 2020

There's a significant challenge facing organizations of all sizes today. They must find and retain IT staff with yesterday's IT expertise while also becoming subject matter experts (SMEs) on tomorrow's technology. The increasing trend is for organizations of all sizes to shift some or all of their IT staff to an outsourced provider. These teams,…


Cyber Security Trends and Predictions for 2021, and Reflections on 2020

December 10th, 2020

Well, 2020 was surely a year to remember—or one that most of us will want to forget.  No one could have predicted the turn it would take, and some are still trying to decide what to do with all the toilet paper they bought (which at some point was possibly one of the highest valued…


The paradigm of effective database security is drastically changing

December 8th, 2020

The transition to cloud computing revolutionizes information technology and the delivery, management, and securing of data. Organizations are rapidly adopting cloud computing, but the evolution is ongoing, with many organizations keeping their mission-critical applications on site. There is one common concern in all organizations: security While migration to the cloud may be a cost-effective option,…


Election Protection: How Cyber Criminals Could Steal Your Vote

November 3rd, 2020

How much should we worry about the security of the upcoming US presidential election? Could a hacker or nation-state actor influence the result? Well, there’s good news and there’s bad news for election cyber security. The good news is that The Cybersecurity and Infrastructure Security Agency and the FBI, in a joint statement, said they…


Cyber Security and the Future of Connected Devices

October 27th, 2020

Before I take you on a journey to the future of connected devices, let's briefly reflect on how we got where we are today. During my career, I'm fortunate to have been involved in many exciting technology and digital innovations. It's important to share some of these with you so you fully understand how amazing…


The Impact of the California Consumer Privacy Act on Privileged Access Management

October 6th, 2020

Consumers are demanding greater control and security over the collection and processing of their personal data. A bevy of privacy laws are rolling out across the world and multiple U.S. states, driving changes in data governance and security practices. The California Consumer Privacy Act (CCPA) has the broadest impact of any U.S. state or federal…


What does world-class Identity Governance look like?

September 10th, 2020

Identity governance is a critical foundational practice required to secure and manage privilege and access across the enterprise. Organizations are required to demonstrate an enterprise identity governance program that complies with nearly every significant compliance audit for almost every industry. Identity governance programs are typically deployed as part of the security stack that includes Identity…


Rising to the Modern PAM Challenge

September 8th, 2020

What drives change in the security space? Either a significant shift in the business environment disrupts how people work, or technology advancements impact the attack surface. Today, security teams are facing both challenges. Remote work is here to stay. No company that I've talked with has plans to bring the full workforce back to the…


Thycotic shifts the language used in products and materials to promote inclusivity

August 27th, 2020

This moment in 2020 is a flashpoint in time. We hear calls for a number of changes to address the current political and cultural climate.  As a security software company, our engineers have seen a lot of discussion around the use of terminology in technology that may be perceived as racist. Is it appropriate to…


Industrial IoT, Security, and Privileged Access Management

August 4th, 2020

The convergence of operational technology (OT) and information technology (IT) has propelled “Industry 4.0” into the spotlight as the next wave of the industrial revolution. The Industrial Internet of Things (IIoT) brings IT and OT together in industries such as manufacturing, logistics, smart buildings, utilities, and critical infrastructure. Companies that get IIoT right will have…