+1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Articles in the ‘IT Tools’ Category

Six Key Differences Between Password Management Tools and PAM

September 4th, 2018

In the past, Privilege Access Management (PAM) was accessible only to large enterprises with skilled IT teams. Feature-heavy PAM tools became more and more complex and expensive to manage. Meanwhile, security-conscious small and medium businesses were relegated to using password tools designed primarily for consumers. While consumer password tools provide a “password vault” to store…


Hacking the US Elections: How Government Agencies Can Protect Themselves

August 24th, 2018

The US midterm elections campaigns are well under way and expected to be held on Tuesday, November 6, 2018.  This midterm election is significant as it will take place right in the middle of President Trump’s first term and will likely be an indicator of the US citizens’ confidence in both the President and the…


Complex Cyber Security Tools Aren’t Just Painful, They are Downright Dangerous

July 24th, 2018

Securing your company is a big job. People are counting on you to stay one step ahead of cyber criminals and keep them safe. But, when the cyber security tools you rely on are too cumbersome to use, you can’t get your job done. We believe cyber solution providers have a responsibility to make your…


Why Knowledge is Power In PAM

June 7th, 2018

Guest post from Alpha Generation a Thycotic certified partner who specializes in IT distribution with a focus on proactive security in the UK. As you’d expect, we think the right technology is a critical part of IT security. Tools for Privileged Account Management (PAM) are a vital addition to your security stack, protecting against threats that firewalls and antivirus…


Where Privileged Account Management is Really Failing

March 22nd, 2018

From software vulnerabilities and DDoS to ransomware, the world of cyber security can often feel like you’re being pulled in every direction at once. With limited resources, it’s a challenge to know which threats should be your priority and where investing in security will really make an impact. So where should you focus your effort?…


5 Free Encryption Tools You Can Use Today to Protect Yourself!

January 3rd, 2018

Author Note:  These are all 3rd party tools that have been recommended to me by peers and experts in the field.  With that said, Thycotic does NOT endorse any of these: please explore and use at your own risk.  Email Encryption Tool OpenPGP – An open source encryption protocol used by many clients for providing…


PAM Risk Assessment: your first step to better privileged access control

December 12th, 2017

These days Privileged Access Management and Privileged Account Management (PAM) are interchangeable terms that get a lot of attention. There’s a reason why PAM is fast becoming a top-of-mind cybersecurity issue:  up to 80% of cybersecurity breaches are associated with the abuse or misuse of privileged account credentials. And these credentials readily give hackers or…


Integrate the Thycotic Mobile App with Your EMM Solution Instantly

September 28th, 2017

Secure your employee's BYOD devices before loading Thycotic applications Thycotic has joined forces with AppDome so our customers can easily integrate the Thycotic mobile app with an Enterprise Mobility Management (EMM) solution of their choice. EMM enables IT organizations to manage and secure company data on mobile devices. There are several EMM solutions available including…


The Mission of Secret Server Free

November 29th, 2016

The Threat Not only do privileged accounts exist on every network, but they exist on nearly every aspect of it. The router has an administrative login, the database has one, and every workstation has either a local or domain administrator account that can be accessed from it. The reality is that these accounts, if compromised,…


Protect Endpoints from Malware using Deny-First Whitelisting

November 16th, 2016

Malware is on the rise, and shows no signs of slowing. According to the AV-TEST Institute: • Through September 2016, nearly 600 Million different types of malware exist • Over 140 Million new types of malware are created every year • Over 11 Million new types of malware are discovered every month Traditional anti-virus and…