Phone Number +1-202-802-9399 (US)

Thycotic’s Cyber Security Blog

Gartner Magic Quadrant Privileged Access Management Thycotic

FEATURED STORY:

Thycotic named a
Leader in Gartner 2020
PAM Magic Quadrant

Filter by Tags: 

Privileged Access Management for Industrial IoT

August 4th, 2020

The convergence of operational technology (OT) and information technology (IT) has propelled “Industry 4.0” into the spotlight as the next wave of the industrial revolution. The Industrial Internet of Things (IIoT) brings IT and OT together in industries such as manufacturing, logistics, smart buildings, utilities, and critical infrastructure. Companies that get IIoT right will have…


PAM cloud security is different. Let me explain why

July 28th, 2020

The 2020 Verizon Data Breach and Incident Report (DBIR) published in May gives a clear indication of where privileged access management (PAM) security is going these days. And the forecast is for cloudy skies ahead.  That’s because: 77% of cloud breaches are due to compromised credentials Attacks on web applications more than doubled in 2019…


EU GDPR two years in: What’s happened so far, and what’s in store for the future?

July 21st, 2020

On May 25th, 2020 EU GDPR was 2 years old and it passed with little noise.  I guess that everyone’s been distracted by other events such as the COVID-19 Pandemic which has put the world on pause for the time being, and that includes EU GDPR. EU GDPR has raised the bar for digital rights,…


The Twitter Hack and the Failure to Protect Privileged Access

July 17th, 2020

Twitter. The biggest social media hack so far, and it could have been much, much worse! We all should be very worried. Could a tweet start a war, change the outcome of an election, cause a riot, or even get people to send money (bitcoin) to unverified BTC wallets? On Wednesday 15 July, we experienced…


IAM: The Future of Identities and How We’ll Get There

July 14th, 2020

Identity and Access Management (IAM) is the ability to provision, manage, audit and secure digital identities to facilitate and enable approved, authentic requests or connections to view company data, services, systems, networks, and assets. This applies whether they are located on premise or in the cloud, based on roles and privileges assigned to each digital…


Privileged Access Management Expertise Boosts Your Cyber Security Career

July 7th, 2020

Shortage of cyber talent is a top concern for 63% of senior executives, according to a recent Gartner survey. The number of unfilled cyber security positions is over four million, up from 2.9 million last year, says the latest (ISC)2 Cybersecurity Workforce Study. This includes 561,000 in North America, 291,000 in Europe, and a staggering…


Think Differently About Unix / Linux Privilege Management

June 30th, 2020

Security models have struggled to match the evolution of Unix. Over its long history, Unix has evolved and changed in many different ways. What started in Bell Labs 40 years ago has spawned more than 150 variants of Unix in use today. Unlike the linear progression of Windows operating systems, in which most organizations use…


Just-in-Time Privileged Access Eliminates the Danger of Standing Privileges

June 23rd, 2020

Granting users standing access to privileged resources violates the principle of least privilege and introduces significant risk. With undifferentiated access, users can (and do) take unauthorized actions because they’re given TOTAL control of a resource. They could give a password to another person, who could then access a resource without appearing in an audit trail. They could access critical resources…


5 Top Takeaways from the Verizon Data Breach Investigations Report 2020

June 17th, 2020

The latest Verizon Data Breach Investigations Report 2020 is now publicly available to download or read online. As one of the industry’s top cyber security reports, the 13th Edition of the Verizon Data Breach Investigations Report (DBIR) is one of our leading indicators of what causes security incidents and why data breaches occur.  With researchers…


Endpoint Security Demands a Defense-in-depth Strategy

June 16th, 2020

Endpoints, the devices people use to access company resources, are a weak spot in corporate security. Compromised endpoints are a primary access point that cyber criminals use to infiltrate a network. Two-thirds of companies are compromised by exploits that originate with an endpoint. The volume of endpoint attacks is rising, as is the sophistication of…