Thycotic Telephone Number +1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Articles in the ‘Industry News’ Category

Top 10 Best Cyber Security Podcasts of 2019

July 9th, 2019

Podcasts have transformed the way we digest news, learn on the go, and optimize our commutes. With podcasts gaining popularity due to their ability to fit into our busy lives, a wave of new cyber security experts have launched a series of IT podcasts to keep us informed about the latest security threats, InfoSec tools,…


Protect Your Privileged Credentials with WebAuthn

June 25th, 2019

85% of organizations fail to achieve basic PAM capabilities according to Thycotic’s 2019 State of Privileged Access Management (PAM) Maturity Report.  This is due in large part to poor security hygiene. It’s essential that organizations deploy proper security precautions to ensure privileged user accounts are not vulnerable or even already compromised. Organizations still struggle with…


Service Account Governance: Provisioning to Disposal and Everything in Between

June 18th, 2019

When Bank United’s Anne Gorman first tried to inventory her company’s service accounts, she was flying blind.  “We didn’t know how many service accounts we had. We didn’t know where the service accounts were. Nobody even knew the passwords to think about what the service accounts ran. It was a hot mess,” Anne admits. Bank United’s struggle with privileged…


Your city does not have to be a victim of ransomware

June 11th, 2019

These cities have a common foe. Albany, New York; Baltimore, Maryland; Orange County, N.C.; Sammamish, Wash; Atlanta, GA They have all been subject to Ransomware attacks in the past 12 months. The most recent victim being Baltimore, MD which has been the target of ransomware twice in the past year. According to the 2019 Verizon Data Breach Investigations…


World Password Day 2019: The 6 Worst Password Fails

April 30th, 2019

We’ve covered a lot of password security tips and ways to secure your credentials on The Lockdown. For World Password Day 2019 we thought we’d do things a bit differently and share some of the worst password fails this past year.  While these organizations and individuals may not appreciate the extra attention, these password fails…


The Evolution from Password Managers to Privileged Access Management. Which is right for you?

April 2nd, 2019

Start by performing your own Business and Data Impact Assessment to determine the most critical data and assets, then align them to your privileged accounts and privileged access. In Summary: Privileged Access Management is the new cyber security perimeter and a very effective solution—it is significantly reducing organizations’ risks from cyber-attacks and insider abuse. PAM…


Facebook Password Breach: What You Need to Know

March 22nd, 2019

Yesterday Facebook disclosed during a routine security review they discovered “some” user passwords were being stored unencrypted, but the passwords were not visible to anyone outside of Facebook. Facebook’s definition of “some” doesn’t really illustrate the full magnitude of this event. Regardless, we are still talking about a password breach situation, and hundreds of millions…


The new cloud security question PAM experts need to answer

February 19th, 2019

Enterprises are no longer asking, “is the cloud secure?” with the same anxiety and fear they expressed just a few years back. As long as cloud-based IT resources are protected in a highly secure environment (such as SOC2 data centers) and demonstrate advanced security controls, enterprises have gotten on board the cloud train. The pace…


Actions CISOs Must Take to Overcome Negative Perceptions

February 12th, 2019

Chief Information Security Officers (CISOs) shoulder tremendous responsibility. They’re ultimately responsible for their company’s cyber security posture. At the same time, the security decisions they make also impact core business metrics such as productivity, cost savings, revenue growth, and brand perception. The world of today’s CISOs is a balancing act. On one hand, they are…


Gartner: Privileged Access Management is the #1 Cyber Security Priority for 2019

February 11th, 2019

A recent report from Gartner reveals the top IT Security Projects for 2019 with Privileged Access Management taking the number one spot. Before we get into why Privileged Access Management (PAM) is the number 1 Cyber Security Priority in 2019, let’s take a quick look at what lead up to this change Senior executives are…