+1-202-802-9399 (US)

Thycotic’s Cybersecurity Publication

FEATURED STORY:
The 6 Most Disturbing Data Breaches
In 2018 So Far

And how they could have been prevented

Filter by Tags: 

The Black Hat 2018 Hacker Survey Report and Recap by Thycotic

September 18th, 2018

Another Black Hat conference has come and gone and more than 17,000 international security professionals converged on Las Vegas, USA to learn, share, educate and disclose security research on the latest cyber threats, attacks, vulnerabilities and techniques used to bypass the security employed by most governments and organizations globally. Of course, Thycotic’s team was there,…


BUY, BUY, BUY, BUY is sometimes not the answer!

September 17th, 2018

Strategy, vision, and innovation.  These are the key ingredients to creating software that’s good for people and business. Bomgar is desperately wanting to enter the growing Privileged Access Management (PAM) market. Originally, Bomgar started as a Secure Remote Desktop and Remote Support company in a market crowded with free and low-cost solutions.  Under pressure, Bomgar needed…


Recap: Partner UNLOCKED 2018

September 14th, 2018

This year saw Thycotic’s Annual International Partner Conference – UNLOCKED took place in the stunning seaside location, Nice, the heart of the French Riviera. Hosted at the waterfront destination, the Radisson Blu, we were joined from the 4th – 6th September by our wonderful partners from all across the world. From enjoying lunch on a…


Seven Signs It’s Time to Move On from GPO-Only Privilege Management

September 11th, 2018

Many organizations gravitate towards Group Policy Objects (GPO) for privilege management because it offers enough functionality to get started managing privileges. Yet, as your needs evolve, you may find that you require a privilege management system better suited to a maturing, sophisticated organization. What are some of the warning signs that you need more than…


Six Key Differences Between Password Management Tools and PAM

September 4th, 2018

In the past, Privilege Access Management (PAM) was accessible only to large enterprises with skilled IT teams. Feature-heavy PAM tools became more and more complex and expensive to manage. Meanwhile, security-conscious small and medium businesses were relegated to using password tools designed primarily for consumers. While consumer password tools provide a “password vault” to store…


Secret Server Vault Named Best of VMworld Security Finalist

August 31st, 2018

Thycotic Solutions Recognized for Third Finalist Award in Five Years WASHINGTON, D.C., August 31, 2018 — Thycotic, a provider of privileged access management (PAM) solutions for more than 10,000 organizations worldwide, today announced the company was selected as a finalist for the Best of VMworld 2018 Awards in the “Security” category for its Secret Server Vault solution.…


Incident Response: Are You Breach-Ready?

August 28th, 2018

It’s no longer rare to see cyber-attacks in the daily news. From ransomware to data breaches to DDoS (Distributed Denial of Service) attacks, the incident is usually attributed to either cyber criminals or nation states, and almost always comes from beyond our own country’s borders and laws. Because of this, we worry about clicking on…


Hacking the US Elections: How Government Agencies Can Protect Themselves

August 24th, 2018

The US midterm elections campaigns are well under way and expected to be held on Tuesday, November 6, 2018.  This midterm election is significant as it will take place right in the middle of President Trump’s first term and will likely be an indicator of the US citizens’ confidence in both the President and the…


Back to the Basics: The problem with forcing regular password expiry

August 21st, 2018

For many people and organizations around the world a single password is sometimes the only security control protecting their sensitive information, access to email and even their bank account. The traditional password best practice was to create a long, complex password that only you would know, and it protected one or two accounts; you likely…


Privileged Account Management and Identity Access Management: Same Family, Different Strengths

August 14th, 2018

From a cyber criminal’s point of view, obtaining privileged account information has the highest ROI of any attack strategy. A malicious actor with privileged account passwords in hand could infiltrate key databases and access highly sensitive data. To obtain this information, attackers use increasingly sophisticated tools and social engineering techniques which are extremely difficult for…