Phone Number +1-202-802-9399 (US)

Thycotic’s Cyber Security Blog

FEATURED STORY:

5 Best Practice Cyber Security Tips for Working Remotely

Help your IT staff secure their remote workstations

Filter by Tags: 

Building the Case for Privileged Session Management

March 17th, 2020

You simply can’t be everywhere at once. How can you keep tabs on your most sensitive and critical systems? If only you had eyes in the back of your head. Even organizations with well-documented PAM policies don’t simply trust that people are doing the right things Privileged session management increases oversight and accountability so you…


Best Practices and Cyber Security Tips for Working Remotely

March 16th, 2020

Given the unusual recent circumstances, many employees around the world are finding themselves in a situation where they must work from home or remotely. I’ve been working remotely for about 15 years, so I thought it would be great to share some of my experiences, cyber security best practices and tips, and lessons learned on…


Lessons we’ve learned: the EU NIS directive and securing critical infrastructure

March 10th, 2020

What is NIS? The Networks & Information Systems (NIS) Directive was created by the European Union (EU) with the specific aim of raising levels of overall cyber security and network resilience for critical infrastructure. NIS improves overall EU cyber security by driving organizations to adopt enhanced security for critical infrastructure. The NIS Directive & Critical…


A Guide to Managing and Securing Privileged Users

March 3rd, 2020

Organizations often have two to three times more privileged user accounts than individual employees. Securing these special accounts is vital to protecting sensitive information and critical systems from cyber attack. To help people stay productive, you must provide appropriate access for privileged users while also minimizing risk. Privileged users require special handling, training, and oversight.…


Cyber-Criminals are Targeting Your Service Accounts, and Regulators are Taking Notice

February 25th, 2020

For the past few months we've been highlighting the critical nature of service accounts  and the importance of governing service accounts appropriately.  Recently, a customer came to us following a Sarbanes-Oxley (Sox) audit they failed largely due to mismanaged service accounts. It’s a story we’re hearing more and more frequently. Regulators are finally catching on…


The CISO Research Report: CISOs thrive on being Guardians of the Business and maybe even the Galaxy

February 18th, 2020

Is Data the new Oil? Some people maintain that "Data is the new oil". Tech companies around the world are now ranking among the largest global companies. A number of them have values that exceed some countries' GDP.  Tesla, some would argue, is a tech company that builds cars. It now has a market value…


8 Signs you’re outgrowing your PAM System and what to do next

February 11th, 2020

Growth is a great problem to have. Suddenly you’re onboarding lots of people, launching products and signing off on new projects. It can also be stressful. Your company is looking to you to keep IT systems running smoothly and securely.  As your company grows, the security tools you’ve been using need to keep up with constant…


PAM and AWS: Keeping pace with AWS privileged accounts

February 4th, 2020

Amazon Web Services (AWS) gives IT and development teams tools to move fast and change direction on a dime. Privileged accounts for AWS resources are created quickly and may be abandoned just as quickly. With such a fluid process, it’s difficult for security teams to stay on top of how many privileged accounts have access…


IT Security Performance impacts the Boardroom

January 28th, 2020

Cyber security has become a frequently debated risk, and according to the World Economic Report is a top-5 risk to world economies and stability. It's slightly behind other risks such as natural disasters, failure to mitigate climate change, and extreme weather.  Cybersecurity now impacts almost everyone globally, exposes us to significant risks, and has quickly…


New DevOps Secrets Vault Release Adds Key DevOps and RPA Integrations

January 21st, 2020

We’ve discussed how DevOps and robotic process automation (RPA) are changing the game in previous blogs. We’re seeing steady growth in requests from our customers to integrate with more and more types of technology solutions, including DevOps and RPA. For DevOps, we’ve seen it mature to a point where most high-velocity organizations running on modern…