Thycotic Telephone Number +1-202-802-9399 (US)

Thycotic’s Cyber Security Publication

FEATURED STORY:
Your Next Great Move

Why moving PAM from on-premise to cloud could be your next great move

Filter by Tags: 

What is Least Privilege? Why you need it and how to get started

November 20th, 2018

Least privilege calls for granting only the minimum permissions required by an end-user, application, service, task or system to perform the jobs they have been assigned. Least privilege is intended to prevent “over-privileged access” by users, applications, or services to help reduce the risk of exploitation without impacting productivity or involving the IT help desk.…


How to get your entire company on board with Privileged Access Management

November 13th, 2018

Maybe you’ve recently failed an audit, or you can’t stand yet another password being uploaded to your IT team’s risky, shared Excel doc. For whatever reason you are here, you are ready to tackle Privileged Access Management head on. But hold on, you may have a few hurdles you have to overcome first. Before you…


Back to the Basics: Service Account Management 101

November 8th, 2018

Service accounts don’t have to be a nightmare. Get in control now.  Service accounts are typically used in operating systems to execute applications or run programs, either in the context of system accounts (high privileged accounts without any password) or a specific user account, usually created manually or during software installation.  On Unix and Linux…


Why an Enterprise Password Manager is for Everyone from SMBs to Corporations

November 6th, 2018

A simple yet effective way of managing business passwords takes high priority on the wish-list of every organization, big and small. This is evidenced by the sheer volume of people searching Google for “business password manager” every day. But what may surprise you is that no matter the size of your business—you must go beyond…


5 Spooky Privilege Security Mistakes that Will Haunt Your Organization

October 30th, 2018

It’s a dark and stormy night. Suddenly your system locks up. Then you get a message, demanding online payment to release your sensitive data back to you. Unfortunately, this isn’t a Halloween prank. Ransomware is on the rise and organizations of all types are falling victim. Your risk of cyber-attack exponentially increases if you’ve made…


Get Complete Application Control Management with CylancePROTECT and Privilege Manager

October 19th, 2018

Thycotic customers are constantly requesting integrations with other products in their arsenal, especially other security products. Thycotic’s product team for Privilege Manager—our least privilege and application control product—is asked to work with CylancePROTECT® day after day. Our common customers are using both Thycotic and Cylance products on the endpoint to provide multiple layers of malware protection.…


(SSH) Keys to Unix Security

October 9th, 2018

Root accounts are the keys to powerful IT systems, the backbone of your entire infrastructure. They use privileged credentials to control shell access, file transfers, or batch jobs that communicate with other computers or apps, often accessed remotely, with local configuration. They can be the trickiest of all types of privileged accounts to secure, particularly…


Ostriches, Zero Day Exploits, and the Elusive CyberSec Expert: Why SMBs Should Implement Cloud-Based PAM

October 2nd, 2018

Small and medium-sized businesses (SMBs) face a cyber security trifecta. Cyber criminals are increasingly targeting the most vulnerable businesses (not just the biggest fish). Sophisticated attackers quickly take advantage of newly revealed vulnerabilities. And, cyber security professionals are in short supply. Maybe SMBs aren’t aware that they can use the same types of security systems…


The Black Hat 2018 Hacker Survey Report and Recap by Thycotic

September 18th, 2018

Another Black Hat conference has come and gone and more than 17,000 international security professionals converged on Las Vegas, USA to learn, share, educate and disclose security research on the latest cyber threats, attacks, vulnerabilities and techniques used to bypass the security employed by most governments and organizations globally. Of course, Thycotic’s team was there,…


BUY, BUY, BUY, BUY is sometimes not the answer!

September 17th, 2018

Strategy, vision, and innovation.  These are the key ingredients to creating software that’s good for people and business. Bomgar is desperately wanting to enter the growing Privileged Access Management (PAM) market. Originally, Bomgar started as a Secure Remote Desktop and Remote Support company in a market crowded with free and low-cost solutions.  Under pressure, Bomgar needed…