Phone Number +1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘Compliance and Reporting’

Cyber Security Incident Reporting Process and Template

May 6th, 2021

Ever since we launched our customizable cyber security incident report template, I’ve been amazed by its volume of downloads. I quickly realized that the increasing cyber threats from criminal hackers, malware, and ransomware being taken seriously by organizations large and small, and that there is a growing demand for guidance and information on cyber security…


Beazley Improves Security Compliance and Saves Time on Audits

April 6th, 2021

Specialist insurer Beazley has exponentially more secrets than employees. The volume and variety of their privileged accounts made them difficult to manage and time-consuming to audit. An external security audit identified gaps in Beazley’s secrets management processes that opened the door to potential privileged account attacks. “The audit discovered privileged account passwords that hadn’t been…


Privilege Manager 11: New Privilege Management Capabilities for Unix and Linux

March 2nd, 2021

With the latest release of Privilege Manager, all endpoints and servers throughout your organization can now follow consistent least privilege and Zero Trust policies, whether they are Windows, Mac, or Unix/Linux. Until now, privilege security for Unix/Linux has been cumbersome and even risky.  Unix/Linux has become the go-to operating system for many types of computer…


Consider this when switching to an IT Managed Service Provider (MSP)

December 15th, 2020

There's a significant challenge facing organizations of all sizes today. They must find and retain IT staff with yesterday's IT expertise while also becoming subject matter experts (SMEs) on tomorrow's technology. The increasing trend is for organizations of all sizes to shift some or all of their IT staff to an outsourced provider. These teams,…


The Impact of the California Consumer Privacy Act on Privileged Access Management

October 6th, 2020

Consumers are demanding greater control and security over the collection and processing of their personal data. A bevy of privacy laws are rolling out across the world and multiple U.S. states, driving changes in data governance and security practices. The California Consumer Privacy Act (CCPA) has the broadest impact of any U.S. state or federal…


EU GDPR two years in: What’s happened so far, and what’s in store for the future?

July 21st, 2020

On May 25th, 2020 EU GDPR was 2 years old and it passed with little noise.  I guess that everyone’s been distracted by other events such as the COVID-19 Pandemic which has put the world on pause for the time being, and that includes EU GDPR. EU GDPR has raised the bar for digital rights,…


Secret Server Product Update: Increase Productivity with Secret Server 10.8

April 7th, 2020

Doing more isn’t always doing better. No one knows this more than IT operations and security teams. Some days you’re slogging through tedious, repetitive work and jumping through hoops, all while fighting the ‘noise’ of alerts.  What’s more, fatigue, lag time between notification, human error and lack of oversight create potential vulnerabilities. New enhancements provide…


Lessons we’ve learned: the EU NIS directive and securing critical infrastructure

March 10th, 2020

What is NIS? The Networks & Information Systems (NIS) Directive was created by the European Union (EU) with the specific aim of raising levels of overall cyber security and network resilience for critical infrastructure. NIS improves overall EU cyber security by driving organizations to adopt enhanced security for critical infrastructure. The NIS Directive & Critical…


SWIFT Controls, Cyber Crime and Privileged Access Management: Securing Banking and Finance

October 15th, 2019

The Society for Worldwide Interbank Financial Telecommunication (SWIFT) provides financial messaging services to banks, financial institutions and corporations all over the world. The technology is used to exchange sensitive information about financial transactions by more than 11,000 customers in over 200 countries. Financial institutions: a major target for cyber criminals; a critical subject for security…


Complete Guide to Leveraging Session Recording to Improve Accountability and Meet PCI Compliance

March 5th, 2019

You’ve set up policies. You’ve trained your team. You’ve vetted third parties. But, even the most proactive privilege security strategy can’t account for every situation and every type of risky behavior.   Today many Thycotic customers rely on session recording and monitoring capabilities for added peace of mind. If any privileged user adds a backdoor account or makes an unauthorized configuration change,…