+1-202-802-9399 (US)

Thycotic’s Cybersecurity Publication

FEATURED STORY:
Cyber Security Responsibilities: Who owns your organization’s PAM Policy Template? 

Who is responsible for creating, implementing and overseeing your organization’s Privileged Account Management Policy template? And what is at risk if no individuals or departments are named to ensure that your users and systems are in compliance with your PAM Policy?

Filter by Tags: 

Equifax: What you need to do right now

September 14th, 2017

The news of the mega breach at Equifax is significant not just because of the size of the breach, but due to the sensitivity of the information stolen which ultimately enables cyber criminals to target their victims on multiple fronts including but not limited to Identity Theft, Financial Fraud or changing existing information or security…


Get the best privileged account management tips from the world’s top experts

September 13th, 2017

Whether you are a customer of Thycotic or not, if you can get to Washington D.C. this October, you are not going to want to miss UNLOCKED. UNLOCKED is our annual security conference where people from all around the country travel for two things: 1. Hear from industry experts and leaders on what they’re doing…


6 Things Every CIO and CISO Should Know

September 12th, 2017

Guest column by SailPoint. Author: Darran Rolls The relationship between the CIO and CISO is often seen as one that is complicated by conflicting priorities. CIOs are under pressure to drive business solutions faster than ever, so the risk mitigation that the CISO seeks to achieve often creates an imbalance between the two – security…


What is PuTTY and what’s new with it in 2017?

September 7th, 2017

  What is PuTTY? PuTTY is an open source application that allows you to connect remotely to many different types of systems, over various communication protocols.  However, PuTTY is most famously used for SSH connects from Windows systems to Unix based systems.  This application allows you to connect your private SSH keys and enter passphrases…


Top 5 privileged account security reports CISOs must have: What Privileged Account passwords are expiring this week?

August 31st, 2017

How do you know when a password is about to be changed according to an assigned password rotation interval? Or when a privileged account or any other item stored within your privileged account management tool is reaching the end of its validation period and needs to be renewed? In this exclusive 5-part Thycotic educational series…


Top 5 privileged account security reports CISOs must have: What is the status of your privileged account password policy compliance?

August 28th, 2017

Do you know an IT security professional who would NOT want an at-a-glance view of all the credentials being managed by their privileged account management tool, and absolute assurance that they adhere to the organization’s assigned policy requirements? I think not. In this exclusive 5-part Thycotic educational series we outline the privileged account security reports…


SANS 2017 Threat Landscape: highlights of the cyber threat survey

August 24th, 2017

The latest SANS 2017 Threat Landscape Survey has been released—the theme of the survey is ‘Users on the Front Line’. In summary, the survey results indicate that Endpoints and Users are on the front line in the battle against cyber threats. This reiterates Thycotic’s message that the traditional cyber security perimeter is no longer the…


Passwords and Biometrics. Can they coexist, and should they?

August 23rd, 2017

The vision of a biometrics-led future for IT security is breathtaking, but is there a place in the future for passwords? Or are passwords ancient history? Passwords Need Better Management, Not Replacement Forget your passwords. They’re ancient history. That’s the message you’ll increasingly see if you keep up with the latest developments in security. But…


Black Hat Hacker Insights: The easiest way hackers access your sensitive data

August 17th, 2017

Hackers claim that compromised privileged accounts are their quickest route to your sensitive data. We asked nearly 300 hackers “What is the fastest route to getting access to an organization’s sensitive data? The response was that it’s a toss-up between privileged accounts and compromised email accounts, both of which can hold a trove of sensitive…


Top 5 privileged account security reports CISOs must have: Who hasn’t logged in within the last 90 days?

August 16th, 2017

When you know exactly who has not used your privileged account management tool in a while you can eliminate potentially risky users who no longer need access to the tool and the privileged accounts that it protects. In this exclusive 5-part Thycotic educational series we outline the privileged account security reports CISOs must have to…