Phone Number +1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Articles in the ‘Original Research’ Category

Black Hat Hacker Insights: The easiest way hackers access your sensitive data

August 17th, 2017

Hackers claim that compromised privileged accounts are their quickest route to your sensitive data. We asked nearly 300 hackers “What is the fastest route to getting access to an organization’s sensitive data? The response was that it’s a toss-up between privileged accounts and compromised email accounts, both of which can hold a trove of sensitive…


Black Hat Hacker Insights: What’s creating new opportunities for hackers?

August 15th, 2017

Fast-growing technologies are blurring the boundaries of the traditional perimeter and creating new opportunities for hackers. The traditional security perimeter protecting most organizations is proving to be an ineffective cyber security control today. Fast-growing technologies like Cloud, Mobile and Virtualization have made the boundaries of the organization blurry, and this has not gone unnoticed by…


Black Hat 2017 Survey: Hackers disclose your cyber security vulnerabilities

August 9th, 2017

With the start of Black Hat USA 2017, the annual conference turned 20, and more than fifteen thousand executives, security professionals and experts from all around the world arrived in Las Vegas to share experiences and ideas on one of the most formidable security issues facing the world today: cyber security.   It was a…


100% of hackers support data privacy, but over half will crack your passwords for a price

September 1st, 2016

The world’s elite hackers all come together during the most coveted hacker conference in Las Vegas for Black Hat.  The conference now running for its 19th year consists of six days of intense training, workshops, briefings, sessions, and knowledge sharing between hackers. We took the opportunity to ask hackers about data protection, privacy, and government…


RSA 2016 Cyber Terrorism Survey Results and Thoughts

April 4th, 2016

RSA 2016 was an incredibly busy show for us here at Thycotic. Between releasing a slew of new features for our flagship software Thycotic Secret Server, announcing our acquisition of Arellia, continuing to drive the Privileged Account Management space, and delivering multiple talks on how to solve many of the most common security and IT Operations…


NSA Surveillance Strong as Ever Since Snowden Revelations, According to RSA Security Pros

June 2nd, 2015

Security professionals from across the world ventured to San Francisco this April for RSA Conference’s 26th annual information security conference. This year broke a record for the largest attendance of all time with 33,000 in attendance. RSA Conference’s theme this year was ‘Where the World Talks Security’. We thought what better place than RSA to…


Why we survey a bunch of hackers at Black Hat every year

September 30th, 2014

At Black Hat USA every year, we conduct a survey of self-identified “black hat” hackers. Why’d we do it? Because it’s not every day that you can get an insider perspective on the thought process and motivation behind today’s black hat hacker. Black Hat vs White Hat vs Awesome Programmers We have to caveat this…