+1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Articles in the ‘Original Research’ Category

Are We Becoming an Industry of PAM “Haves” and “Have-Nots?”

May 7th, 2019

We are worried. A few years back, Gartner reported that more than 65% of organizations allow unrestricted, unmonitored and shared use of privileged accounts. (Forecast Snapshot: Privileged Access Management, Worldwide, 2017). Surely, we thought, with high-profile cyber-attacks in the news and rapid growth of the PAM industry, that number must be decreasing. So, at the…


2018 Cyber Security Breaches: Client Concerns, Opportunities for Solution Providers

May 29th, 2018

Cyber-criminal groups have an extensive arsenal of surveillance and research methodologies they use to search for even the smallest of vulnerabilities in your cyber security protections—vulnerabilities that enable them to infiltrate your organization, gather intelligence and access your systems. Thycotic’s 2018 Global Channel Partner Survey Report indicates that these cyber-criminals are largely successful. If your…


2018 Global State of Privileged Access Management Risk and Compliance: Part 1

April 26th, 2018

Most companies are FALLING SHORT on compliance when it comes to privileged accounts! Thycotic’s research shows Privileged Access Management is a Top Risk and Compliance requirement, yet it’s significantly failing to be fully implemented meaning that most companies fall short on compliance for privileged access. The majority of organizations begin to implement Privileged Access Management…


Majority of Companies are failing at cyber security metrics, and investing blindly

November 22nd, 2017

Thycotic has released the research results from its Security Measurement Index survey. The resulting “2017 State of Cyber Security Metrics Annual Report“ identifies how companies worldwide are measuring the effectiveness and success of their cyber security management strategy. The report is far from comforting Companies and governments world-wide are often just one click or one…


Black Hat Hacker Insights: The easiest way hackers access your sensitive data

August 17th, 2017

Hackers claim that compromised privileged accounts are their quickest route to your sensitive data. We asked nearly 300 hackers “What is the fastest route to getting access to an organization’s sensitive data? The response was that it’s a toss-up between privileged accounts and compromised email accounts, both of which can hold a trove of sensitive…


Black Hat Hacker Insights: What’s creating new opportunities for hackers?

August 15th, 2017

Fast-growing technologies are blurring the boundaries of the traditional perimeter and creating new opportunities for hackers. The traditional security perimeter protecting most organizations is proving to be an ineffective cyber security control today. Fast-growing technologies like Cloud, Mobile and Virtualization have made the boundaries of the organization blurry, and this has not gone unnoticed by…


Black Hat 2017 Survey: Hackers disclose your cyber security vulnerabilities

August 9th, 2017

With the start of Black Hat USA 2017, the annual conference turned 20, and more than fifteen thousand executives, security professionals and experts from all around the world arrived in Las Vegas to share experiences and ideas on one of the most formidable security issues facing the world today: cyber security.   It was a…


100% of hackers support data privacy, but over half will crack your passwords for a price

September 1st, 2016

The world’s elite hackers all come together during the most coveted hacker conference in Las Vegas for Black Hat.  The conference now running for its 19th year consists of six days of intense training, workshops, briefings, sessions, and knowledge sharing between hackers. We took the opportunity to ask hackers about data protection, privacy, and government…


RSA 2016 Cyber Terrorism Survey Results and Thoughts

April 4th, 2016

RSA 2016 was an incredibly busy show for us here at Thycotic. Between releasing a slew of new features for our flagship software Thycotic Secret Server, announcing our acquisition of Arellia, continuing to drive the Privileged Account Management space, and delivering multiple talks on how to solve many of the most common security and IT Operations…


NSA Surveillance Strong as Ever Since Snowden Revelations, According to RSA Security Pros

June 2nd, 2015

Security professionals from across the world ventured to San Francisco this April for RSA Conference’s 26th annual information security conference. This year broke a record for the largest attendance of all time with 33,000 in attendance. RSA Conference’s theme this year was ‘Where the World Talks Security’. We thought what better place than RSA to…