Phone Number +1-202-802-9399 (US)

Thycotic’s Cyber Security Blog

FEATURED STORY:

How to Remove Admin Rights Without Reducing Productivity

Mitigate risks related to over-privileged users to secure your endpoints and ensure compliance

Filter by Tags: 

National Cyber Security Awareness Month: If you connect it, protect it

October 8th, 2020

Can you spot the red flags of a cyber crime? What behaviors do cyber criminals love to abuse? Here's how to avoid being the next victim! Cyber security is no longer just a technology challenge. It's a challenge for everybody who uses and interacts with technology daily. The protection and security of both your work…


The Impact of the California Consumer Privacy Act on Privileged Access Management

October 6th, 2020

Consumers are demanding greater control and security over the collection and processing of their personal data. A bevy of privacy laws are rolling out across the world and multiple U.S. states, driving changes in data governance and security practices. The California Consumer Privacy Act (CCPA) has the broadest impact of any U.S. state or federal…


Shadow IT Security Risks: Web applications off your radar make privileged access management even more complicated

September 29th, 2020

A quiet proliferation of web applications and infrastructure with web-based interfaces is taking place throughout your organization. Known as “Shadow IT,” many web applications and platforms are often licensed by business, financial, and technical users, independent of central IT management. Sometimes these groups even build their own technology solutions. Security and operations folks who are tasked…


Integrating Service Account Management Within Existing IT Workflows

September 22nd, 2020

IT service management providers have made strides replacing collections of legacy tools with a single unified IT service management platform. However, there are still many aspects of IT administration that must be done manually outside of such unified platforms. Service account management is one task that is commonly cumbersome to IT administrators and those in…


DevOps Secrets Vault Release Offers Out-of-the-Box Secret Server Integration and New Home Vault Feature

September 15th, 2020

For DevOps teams, on-demand access to source code, tools, test servers, and production builds are necessary to administer systems and debug production issues. The focus for DevOps security should be automation It’s common to share private keys and credentials for immediate access, which increases the risk from both external and insider threats, either malicious or…


What does world-class Identity Governance look like?

September 10th, 2020

Identity governance is a critical foundational practice required to secure and manage privilege and access across the enterprise. Organizations are required to demonstrate an enterprise identity governance program that complies with nearly every significant compliance audit for almost every industry. Identity governance programs are typically deployed as part of the security stack that includes Identity…


Rising to the Modern PAM Challenge

September 8th, 2020

What drives change in the security space? Either a significant shift in the business environment disrupts how people work, or technology advancements impact the attack surface. Today, security teams are facing both challenges. Remote work is here to stay. No company that I've talked with has plans to bring the full workforce back to the…


Role-Based Access Control for a Complex Enterprise

September 1st, 2020

What is role-based access control (RBAC)? Role-based access control, or RBAC, is the antidote to piecemeal user and permission management. RBAC provides a mechanism for system administrators to set policies and apply them as appropriate. A core tenet of RBAC is to preemptively set rules which apply to all users, rather than making on-the-fly decisions…


Thycotic shifts the language used in products and materials to promote inclusivity

August 27th, 2020

This moment in 2020 is a flashpoint in time. We hear calls for a number of changes to address the current political and cultural climate.  As a security software company, our engineers have seen a lot of discussion around the use of terminology in technology that may be perceived as racist. Is it appropriate to…


Privilege Manager 10.8: Simplifying endpoint privilege management through usable security

August 25th, 2020

A powerful new interface and additional enhancements make Privilege Manager 10.8 an important release to ensure usable security. Privilege Manager is the most comprehensive endpoint privilege elevation and application control solution, capable of supporting enterprises and fast-growing organizations at cloud scale. Over the past year, our product teams and UX and human-computer interaction team have…