+1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Articles in the ‘Top 10s’ Category

New Hire Onboarding Checklist: A CISO’s Perspective

March 12th, 2019

When a new employee enters an organization there are various behind-the-scene activities that must take place to ensure the new hire an efficient onboarding experience. Many are administrative in nature and are taken care of by HR. But then there are those related to cyber security—and they are far too often overlooked. As a security…


Top 5 Top Cyber Security Predictions for 2019

December 24th, 2018

Cyber security was a major topic in 2018 as the compromise of elections and voting machines was at the top of everyone’s minds. Given the critical impact of the midterm elections on future governance, election security is a major concern. It’s especially concerning after it was demonstrated at DEF CON how voting machines could be…


The 6 Most Disturbing Data Breaches In 2018

July 31st, 2018

You could argue that all cyber-attacks and data breaches are disturbing, and you wouldn’t be wrong. But all too often a cyber-incident comes along that hits a whole new level of intrusion or includes an unsettling component of cyber security neglect that causes us to raise our eyebrows higher than usual. It’s important to talk about…


Top 10 Cyber Security Experts to Follow on Social in 2018

July 3rd, 2018

Feel like you’re experiencing cyber security overload? As a cyber security expert you must stay ahead, but it can be hard when there is so much noise. And it’s not like you can turn a blind eye—your company is relying on you to keep everything operating efficiently. And if that’s not enough pressure, you are…


The Lockdown’s 10 Most Popular Blogs of 2017

January 10th, 2018

2017 was a record year for cyber security with breaches and hacks making headlines just about every day.  Thank you for following along with the 2017 chaos as we captured the biggest breaches, security nightmares, and attacks. As a recap, here are the “Top 10” posts from the blog, sorted in increasing order based on readership. Let the countdown begin! #10: How…


5 Scary Data Breaches – What is your Nightmare Cyber Hack Attack?

October 31st, 2017

Bad stuff happens. Bad, b-a-a-d stuff. It happens in the real world, and now it happens in the cyber world too. And it’s only a matter of time before—gasp!—it happens to you. I’m talking about a gruesome hack-attack. You may get targeted directly by hack-monsters lurking online; or you may become the helpless victim of…


Cyber Security Awareness Month: 5 Predictions for Tomorrow’s Internet

October 18th, 2017

The matter of cyber security is rapidly becoming part of everyone’s daily life. But you can no longer keep your personal and work security habits and precautions separate. In the past cyber-attacks were usually only a concern in the workplace, but today cyber-attacks are so common they affect everyone connected to the internet. Cyber-attacks are…


6 Things Every CIO and CISO Should Know

September 12th, 2017

Guest column by SailPoint. Author: Darran Rolls The relationship between the CIO and CISO is often seen as one that is complicated by conflicting priorities. CIOs are under pressure to drive business solutions faster than ever, so the risk mitigation that the CISO seeks to achieve often creates an imbalance between the two – security…


5 Security Policies every CISO Must Enforce Now

July 20th, 2017

Chief Information Security Officers, CISOs, bear some of the heftiest weights on their shoulders of anyone in an organization. Single-handedly, depending on their security policies and the enforcement of them, they can be responsible for the success or downfall of an entire company. It is, literally, a thankless position because usually nobody says a word…


The Top 5 PAM Tasks IT Teams Must Automate Part 5: Compliance Reporting

July 19th, 2017

Automating Compliance Reporting: When privileged account management tasks are being done manually, compliance reporting gets complicated. Yet many organizations must demonstrate compliance and provide evidence to auditors and other reviewing bodies to prove that security policy requirements are being met. In this 5-part Thycotic educational series, we focus on five areas of Privileged Account Management…