Phone Number +1-202-802-9399 (US)

Thycotic’s Cyber Security Blog


How to Remove Admin Rights Without Reducing Productivity

Mitigate risks related to over-privileged users to secure your endpoints and ensure compliance

Filter by Tags: 

Thycotic Cloud Automation Tool Bundle Is Multi-Layered Privilege Security

March 9th, 2021

The explosion of Cloud IT has made privileged access management impossible without automation tools. Critical technical service accounts run through AWS, Azure, and Google Cloud Platform. DevOps teams connect and build cloud applications using CI/CD toolchains. Business users are adopting SaaS tools at a rapid clip—the average enterprise has hundreds of web-based SaaS tools that…

Can You Keep a Secret? Your Secrets Management System Can

March 4th, 2021

There are many different types of secrets in a digital enterprise. Secrets management requires broader and deeper security controls than traditional enterprise password management. It requires a coordinated process for managing all types of secrets in a centralized way to ensure systems and data remain secure. Secrets management keeps all secrets safe, prevents secret sprawl,…

Privilege Manager 11: New Privilege Management Capabilities for Unix and Linux

March 2nd, 2021

With the latest release of Privilege Manager, all endpoints and servers throughout your organization can now follow consistent least privilege and Zero Trust policies, whether they are Windows, Mac, or Unix/Linux. Until now, privilege security for Unix/Linux has been cumbersome and even risky.  Unix/Linux has become the go-to operating system for many types of computer…

Active Directory Security and Hardening: An Ethical Hacker’s Guide to Reducing AD Risks

February 23rd, 2021

Approx. reading time: 8-10mins  This blog is intended for: IT and System Admins IT Security IT Auditors Pen Testers Tech Geeks Anyone moving into a career in Cybersecurity Skip to most common Active Directory misconfigurations In this post, we’re going to focus on common cyber-attacks that target Active Directory (AD). Active Directory is deployed across…

Defense-in-depth with Overlapping Rings of Endpoint Security

February 16th, 2021

Defense-in-depth with overlapping rings of endpoint security When a cyber criminal wants to break into your network, the number one way they succeed is by attacking endpoints. Cyber criminals break into one endpoint and then use the passwords found there, and the privileges they provide, to move laterally from the endpoint onto your network. Endpoint…

Enterprise Trends That Will Define PAM Success in 2021

February 9th, 2021

The landscape of privileged accounts is becoming increasingly complex as organizations add new applications and change working styles in an ongoing COVID-19 world. Meanwhile, cyber criminals are only getting smarter. If you wait too long to plug your security gaps there’s a good chance they’ll find a way to exploit them. Forrester’s most recent Privileged…

Human Error and Implications in Information Security

February 2nd, 2021

Technologists, engineers, and future-focused organizations tout automation as the answer to consistency, reliability, and quality. Automation takes basic tasks out of human hands, freeing up human resources to focus on research, strategy, and planning. Even more, automated systems and services can work tirelessly around the clock. ITOps, DevOps, and SecOps leaders and architects are incredibly…

Enterprise Endpoint Management is a Must When All Users are Privileged Users

January 26th, 2021

A newly released eBook, The Definitive Guide to Endpoint Privilege Management (EPM), makes a strong case for why vulnerable endpoints must be secured from the perspective that all users are privileged users. In the guide’s Foreword, I emphasize that user identity has become the new “perimeter” of cyber security. That’s because a single compromised credential…

SolarWinds Sunburst: One of the Biggest Cyber Attacks Targeting the Software Industry Supply Chain in History

January 25th, 2021

Over the past weeks, we've learned more about one of the biggest cyber attack on the software industry supply chain.  This attack is a wake-up call for the software industry. It’s a true “mass indiscriminate global assault” as quoted by Brad Smith whom I regard as one of the most respected software leaders. His words…

Thycotic Named a 2021 Gartner Peer Insights Customers’ Choice for Privileged Access Management for Large Enterprise, Finance, and North America

January 21st, 2021

The Thycotic team is excited to announce that we have been recognized as a Customers’ Choice in the January 2021 Gartner Peer Insights ‘Voice of the Customer’: Privileged Access Management Markets Large Enterprise, Finance, and North America. Our team at Thycotic takes great pride in this distinction, as customer feedback continues to shape our products…