Phone Number +1-202-802-9399 (US)

Thycotic’s Cyber Security Blog

FEATURED STORY:

5 Most Popular Password Cracking Tools: Protect Your Enterprise

A look at a variety of password cracking tools and security tips to reduce password risk

Filter by Tags: 

A Guide to Managing and Securing Privileged Users

March 3rd, 2020

Organizations often have two to three times more privileged user accounts than individual employees. Securing these special accounts is vital to protecting sensitive information and critical systems from cyber attack. To help people stay productive, you must provide appropriate access for privileged users while also minimizing risk. Privileged users require special handling, training, and oversight.…


Cyber-Criminals are Targeting Your Service Accounts, and Regulators are Taking Notice

February 25th, 2020

For the past few months we've been highlighting the critical nature of service accounts  and the importance of governing service accounts appropriately.  Recently, a customer came to us following a Sarbanes-Oxley (Sox) audit they failed largely due to mismanaged service accounts. It’s a story we’re hearing more and more frequently. Regulators are finally catching on…


The CISO Research Report: CISOs thrive on being Guardians of the Business and maybe even the Galaxy

February 18th, 2020

Is Data the new Oil? Some people maintain that "Data is the new oil". Tech companies around the world are now ranking among the largest global companies. A number of them have values that exceed some countries' GDP.  Tesla, some would argue, is a tech company that builds cars. It now has a market value…


8 Signs you’re outgrowing your PAM System and what to do next

February 11th, 2020

Growth is a great problem to have. Suddenly you’re onboarding lots of people, launching products and signing off on new projects. It can also be stressful. Your company is looking to you to keep IT systems running smoothly and securely.  As your company grows, the security tools you’ve been using need to keep up with constant…


PAM and AWS: Keeping pace with AWS privileged accounts

February 4th, 2020

Amazon Web Services (AWS) gives IT and development teams tools to move fast and change direction on a dime. Privileged accounts for AWS resources are created quickly and may be abandoned just as quickly. With such a fluid process, it’s difficult for security teams to stay on top of how many privileged accounts have access…


IT Security Performance impacts the Boardroom

January 28th, 2020

Cyber security has become a frequently debated risk, and according to the World Economic Report is a top-5 risk to world economies and stability. It's slightly behind other risks such as natural disasters, failure to mitigate climate change, and extreme weather.  Cybersecurity now impacts almost everyone globally, exposes us to significant risks, and has quickly…


New DevOps Secrets Vault Release Adds Key DevOps and RPA Integrations

January 21st, 2020

We’ve discussed how DevOps and robotic process automation (RPA) are changing the game in previous blogs. We’re seeing steady growth in requests from our customers to integrate with more and more types of technology solutions, including DevOps and RPA. For DevOps, we’ve seen it mature to a point where most high-velocity organizations running on modern…


Thycotic Integrations provide opportunities to connect, control and secure

January 16th, 2020

Privileged access management (PAM) is a critical piece of your security infrastructure. But we know it’s just one part of your infrastructure which also includes identity and access management platforms, multi-factor authentication systems, SIEM tools, IT ticketing systems, DevOps tools, and more. Just as single products that aren’t usable result in slow implementation and low…


How to protect service accounts without losing your mind: Automated tools!

January 14th, 2020

Here at Thycotic, we are always banging the drum on the importance of securing privileged access. Early in 2019, we got a glimpse of what can happen if you don’t when more than 100 million credit applications at Capital One were stolen by an individual in a security breach that involved a web service and…


The robots are here. Actually, they’ve been here for a while

January 7th, 2020

Every team across your organization is looking for ways to free up more time. In the past year, Robotic Process Automation (RPA) has exploded as a new way to remove tedious, repetitive tasks from the shoulders of humans and give them to—you guessed it—robots. RPA essentially creates a non-person account—a “bot”—that mimics the activities of…