+1-202-802-9399 (US)

Thycotic’s Cyber Security Publication

FEATURED STORY:
The 7 Most Dangerous Privileged Accounts

Every organization must discover, manage and secure these 7 deadly privileged accounts to reduce their business security risk.

Filter by Tags: 

Up, up and to the Clouds: Cloud Computing 101

January 22nd, 2019

The cloud has always been this mysterious place—many companies embraced it and put everything they could into the cloud, while others watched cautiously from a distance, wondering whether they should do the same. Before taking you on the journey to the cloud, let’s answer the question “What is the cloud, exactly?” Clearly, it’s been a…


How to kick start your least privilege strategy as we begin 2019

January 15th, 2019

As we open 2019, we are expecting the issue of least privilege cybersecurity to become a priority for companies across the spectrum. One of the big reasons, of course, is that 80 percent of breaches today involve the compromise of IT and business user credentials including usernames and passwords.  To combat the exploitation of compromised…


Privileged Access Management Compliance Through the Eyes of an Auditor

January 8th, 2019

Compliance audits are a stressful, time-consuming effort for many companies. In the Lockdown blog, we often talk about the tools and processes customers use to prepare for both internal and external information security audits. This time we thought we’d turn the tables and speak directly to an auditor to hear his perspective. In this post, auditor…


The Future of Passwords and Password Management in the Enterprise

January 1st, 2019

Passwords have been around for decades now, and they aren’t going away any time soon. And yet, password security best practices have been ignored by many. Too many people and companies are careless with password management, even though they know that a single password in the wrong hands can lead to disastrous consequences. Tempted to…


Top 5 Top Cyber Security Predictions for 2019

December 24th, 2018

Cyber security was a major topic in 2018 as the compromise of elections and voting machines was at the top of everyone’s minds. Given the critical impact of the midterm elections on future governance, election security is a major concern. It’s especially concerning after it was demonstrated at DEF CON how voting machines could be…


Design Principles that Drive Thycotic’s Software User Experience Strategy

December 18th, 2018

Users are the biggest risk to information security. That’s why it’s so important to have a usable software product, especially in the cyber security space. Our goal is to give people the agility and control they need to reduce risk. Usability is our North Star.   With this goal foremost in our minds, we’re building a growing team…


See Where You Place in the PAM Maturity Model

December 11th, 2018

Many companies aren’t sure how to begin their PAM implementation or which security activities have the most impact on their goals. To help you stay on course, Thycotic has developed the first PAM Maturity Model, based on industry best practices that systematically lower privileged account risk, increase business agility and improve operational efficiency. The model…


Lower Risk of PowerShell Vulnerabilities with Privilege Management

November 28th, 2018

PowerShell and other scripting tools are part of an IT professional’s arsenal. They are incredibly powerful, a force multiplier which allows you to automate important or frequently used tasks. The same traits that make these tools a boon for IT pros also make them valuable to malicious actors who can use them to exponentially increase their…


Together Thycotic & IBM Deliver Next-Generation Privileged Access Management

November 27th, 2018

Did you hear the news? We’ve entered into an original equipment manufacturing (OEM) agreement with IBM Security! This partnership comes with an increased need for organizations to secure privileged accounts that are connected to just about every device on the network. Breaches through privileged accounts are on the rise. Now more than ever, organizations need…


Least Privilege Access Control Uncovered

November 20th, 2018

Before I describe the behaviors that make least privilege access control a critical component of your organization’s PAM strategy, let’s clearly define the Principle of Least Privilege (PoLP). The principle of least privilege calls for granting only the minimum permissions required by an end-user, application, service, task or system to perform the jobs they have…