Phone Number +1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘Cloud Security’

A New Approach to Modern Enterprise Access Management

June 4th, 2020

Earlier this week, we publicly announced the acquisition of Onion ID—a San Francisco-based identity and privileged access management (PAM) company. The acquisition marks a significant milestone in Thycotic’s strategic direction as a PAM company. Over the past several years, we have driven innovation through a multi-stage product roadmap designed to help companies adopt PAM and…


Addressing emerging PAM use cases to protect access to SaaS applications, cloud infrastructure, and databases

June 2nd, 2020

With most of the global, white-collar workforce suddenly shifting to working remotely, cloud technology has emerged as a critical component to keep businesses up and running. These services are enabling people to collaborate with one another, and provide the tools they need to stay productive, enhance accessibility and create a mobile friendly environment while working…


DevOps Secrets Vault and Dynamic Secrets in the Cloud

May 19th, 2020

Back in July of 2019, Thycotic released DevOps Secrets Vault, a high-velocity vault for high-speed password and secret creation, archiving, and retrieval. Each month we roll out improvements to this cloud-based tool. In 2020, we’ve been focused on adding dynamic secrets for key cloud platforms. For infrastructure-as-a-service platforms dynamic secrets in DevOps Secrets Vault offer…


The Landscape of PAM is Changing – Customers Want Mobile PAM

May 5th, 2020

At Thycotic, we’re watching the landscape of our customers’ privileged access management needs evolve. PAM can no longer be simply a web application hosted on premise; our customers are telling us they need flexible deployment and access options. More day-to-day business operations need access to data, applications, and platforms Organizations are also acknowledging that PAM…


Privileged Access Management: The Great Cloud Migration

March 31st, 2020

Migrating your PAM instance to the cloud can look from the outset like a pretty daunting task. How, exactly, do you go about transporting what may be years of data and highly sensitive information to a new home? It’s often said that migrating to the cloud is like moving houses, and that’s one of the…


Best Practices and Cyber Security Tips for Working Remotely

March 16th, 2020

Given the unusual recent circumstances, many employees around the world are finding themselves in a situation where they must work from home or remotely. I’ve been working remotely for about 15 years, so I thought it would be great to share some of my experiences, cyber security best practices and tips, and lessons learned on…


PAM and AWS: Keeping pace with AWS privileged accounts

February 4th, 2020

Amazon Web Services (AWS) gives IT and development teams tools to move fast and change direction on a dime. Privileged accounts for AWS resources are created quickly and may be abandoned just as quickly. With such a fluid process, it’s difficult for security teams to stay on top of how many privileged accounts have access…


Service Account 201: Service Accounts in the Cloud

November 12th, 2019

I wrote about the basics of service account management in Back to Basics: Service Account Management 101.  Before I dive into service accounts in the cloud, here's a quick recap of that post. A quick recap on Service Accounts 101 What exactly are service accounts and why are they needed?  Most organizations have two types…


Secret Server product update: Conquer common cloud challenges with the release of Secret Server 10.7

September 12th, 2019

With this newest release, Secret Server not only further strengthens its PAM cloud leadership, but also its overall enterprise readiness and usability. With Secret Server 10.7, users can now: Discover, manage, and delegate access for Amazon AWS privileged accounts Use Secret Server’s command line interface (CLI) from Windows, Mac, and Linux/Unix workstations Meet even the…


Cloud Use Cases: Critical PAM controls to secure a modern cloud environment

July 30th, 2019

Virtually all cloud security failures will be the customers’ fault. That’s what Gartner believes the future of cloud security for the enterprise will look like within the next four years. More than half of cloud security issues will be caused by inadequate management of identities, access and privileges. “The challenge exists not in the security…