Phone Number +1-202-802-9399 (US)

Thycotic’s Cyber Security Blog

FEATURED STORY:

How to Remove Admin Rights Without Reducing Productivity

Mitigate risks related to over-privileged users to secure your endpoints and ensure compliance

Filter by Tags: 

Top 5 Hacking and Cyber Security Books of 2020

January 19th, 2021

Continuous learning is a top priority for me.  It's critical to stay updated on the latest cyber security methods, technologies, strategies, and developments. 2020 brought the opportunity for us to indulge in some additional reading and learn new skills from incredible industry experts. From a young age, I struggled reading the likes of Shakespeare and…


What to Expect When Working with Thycotic Professional Services

January 12th, 2021

Thycotic customers come in all shapes, sizes, and levels of experience. Some are new to PAM. Perhaps they recently inherited the program. Or maybe they’re building a PAM strategy from scratch. Our pro services team supports them at every stage of their journey. Some want more hands-on control. They prefer writing their own scripts, building…


An Ethical Hack Reveals Endpoint Security Vulnerabilities

January 5th, 2021

“Know thy enemy and know yourself; in a hundred battles, you will never be defeated.” ~ Sun Tzu, The Art of War Sun Tzu’s advice is as applicable in cyber security as it is in battle. He warns, “When you are ignorant of the enemy but know yourself, your chances of winning or losing are equal. If ignorant…


Hardening Windows Endpoints Against Cyber Attack: Part II

December 30th, 2020

This post is part of a series on securing your endpoints against cyber attacks. Read: Part I | Part II | Part III | Part IV In Part I of the blog series, Hardening Windows Endpoints Against Cyber Attack, I covered the first three steps of an ethical hack: Step 0: Pre-Engagement Step 1: Passive…


A look behind the scenes of a Wi-Fi Hack: What are the secrets?

December 29th, 2020

You snag a seat at your local café and open your laptop. Maybe you’re on the patio, grateful for the heater. The scent of coffee powers up your brain. The low hum of people chatting is welcome, after months of isolation. The logon page appears as you search for the Wi-Fi in your settings. Despite…


Least Privilege Examples, as told by the Three Ghosts of “A Christmas Carol”

December 24th, 2020

With the holiday season upon us, it’s a good time to settle down with a beloved story. I re-watched the Charles Dickens classic, A Christmas Carol, the other day (well, actually it was Scrooged with Bill Murray, of course) and found myself thinking about the parallels with cyber security. Really, I did. In the story,…


Hardening Your Endpoints Against Cyber Attack: Part I

December 22nd, 2020

This post is part of a series on securing your endpoints against cyber attacks. Read: Part I | Part II | Part III | Part IV To secure Windows endpoints against cyber attacks, it helps to think like a cyber criminal. Cyber criminals look for the cheapest, fastest, stealthiest way to achieve their goals. Windows…


Consider this when switching to an IT Managed Service Provider (MSP)

December 15th, 2020

There's a significant challenge facing organizations of all sizes today. They must find and retain IT staff with yesterday's IT expertise while also becoming subject matter experts (SMEs) on tomorrow's technology. The increasing trend is for organizations of all sizes to shift some or all of their IT staff to an outsourced provider. These teams,…


Cyber Security Trends and Predictions for 2021, and Reflections on 2020

December 10th, 2020

Well, 2020 was surely a year to remember—or one that most of us will want to forget.  No one could have predicted the turn it would take, and some are still trying to decide what to do with all the toilet paper they bought (which at some point was possibly one of the highest valued…


The paradigm of effective database security is drastically changing

December 8th, 2020

The transition to cloud computing revolutionizes information technology and the delivery, management, and securing of data. Organizations are rapidly adopting cloud computing, but the evolution is ongoing, with many organizations keeping their mission-critical applications on site. There is one common concern in all organizations: security While migration to the cloud may be a cost-effective option,…