Phone Number +1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘Compliance and Reporting’

The Impact of the California Consumer Privacy Act on Privileged Access Management

October 6th, 2020

Consumers are demanding greater control and security over the collection and processing of their personal data. A bevy of privacy laws are rolling out across the world and multiple U.S. states, driving changes in data governance and security practices. The California Consumer Privacy Act (CCPA) has the broadest impact of any U.S. state or federal…


EU GDPR two years in: What’s happened so far, and what’s in store for the future?

July 21st, 2020

On May 25th, 2020 EU GDPR was 2 years old and it passed with little noise.  I guess that everyone’s been distracted by other events such as the COVID-19 Pandemic which has put the world on pause for the time being, and that includes EU GDPR. EU GDPR has raised the bar for digital rights,…


Secret Server Product Update: Increase Productivity with Secret Server 10.8

April 7th, 2020

Doing more isn’t always doing better. No one knows this more than IT operations and security teams. Some days you’re slogging through tedious, repetitive work and jumping through hoops, all while fighting the ‘noise’ of alerts.  What’s more, fatigue, lag time between notification, human error and lack of oversight create potential vulnerabilities. New enhancements provide…


Lessons we’ve learned: the EU NIS directive and securing critical infrastructure

March 10th, 2020

What is NIS? The Networks & Information Systems (NIS) Directive was created by the European Union (EU) with the specific aim of raising levels of overall cyber security and network resilience for critical infrastructure. NIS improves overall EU cyber security by driving organizations to adopt enhanced security for critical infrastructure. The NIS Directive & Critical…


SWIFT Controls, Cyber Crime and Privileged Access Management: Securing Banking and Finance

October 15th, 2019

The Society for Worldwide Interbank Financial Telecommunication (SWIFT) provides financial messaging services to banks, financial institutions and corporations all over the world. The technology is used to exchange sensitive information about financial transactions by more than 11,000 customers in over 200 countries. Financial institutions: a major target for cyber criminals; a critical subject for security…


Cyber Security Incident Response and Reporting Process

March 19th, 2019

Ever since we launched our customizable cyber security incident response template, I’ve been amazed by its volume of downloads. I quickly realized that the increasing cyber threats from criminal hackers, malware and ransomware is starting to be taken seriously by organizations large and small, and that there is a growing demand for guidance and information…


Complete Guide to Leveraging Session Recording to Improve Accountability and Meet PCI Compliance

March 5th, 2019

You’ve set up policies. You’ve trained your team. You’ve vetted third parties. But, even the most proactive privilege security strategy can’t account for every situation and every type of risky behavior.   Today many Thycotic customers rely on session recording and monitoring capabilities for added peace of mind. If any privileged user adds a backdoor account or makes an unauthorized configuration change,…


Gartner: Privileged Access Management is the #1 Cyber Security Priority for 2019

February 11th, 2019

A recent report from Gartner reveals the top IT Security Projects for 2019 with Privileged Access Management taking the number one spot. Before we get into why Privileged Access Management (PAM) is the number 1 Cyber Security Priority in 2019, let’s take a quick look at what lead up to this change Senior executives are…


Privileged Access Management Compliance Through the Eyes of an Auditor

January 8th, 2019

Compliance audits are a stressful, time-consuming effort for many companies. In the Lockdown blog, we often talk about the tools and processes customers use to prepare for both internal and external information security audits. This time we thought we’d turn the tables and speak directly to an auditor to hear his perspective. In this post, auditor…


Seven Signs It’s Time to Move On from GPO-Only Privilege Management

September 11th, 2018

Many organizations gravitate towards Group Policy Objects (GPO) for privilege management because it offers enough functionality to get started managing privileges. Yet, as your needs evolve, you may find that you require a privilege management system better suited to a maturing, sophisticated organization. What are some of the warning signs that you need more than…