+1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘Compliance’

NYS DFS 23 NYCRR PART 500: What is it and when is the compliance deadline?

November 9th, 2017

What is DFS 23 NYCRR PART 500? 23 NYCRR PART 500 is a regulation that establishes cybersecurity requirements for financial services companies. The concept of cybersecurity is nothing new, and regulations or compliance mandates around cybersecurity are nothing new either.  At its core, cybersecurity is all about protecting your organization’s data and network from malicious…


Top 5 privileged account security reports CISOs must have: What is the status of your privileged account password policy compliance?

August 28th, 2017

Do you know an IT security professional who would NOT want an at-a-glance view of all the credentials being managed by their privileged account management tool, and absolute assurance that they adhere to the organization’s assigned policy requirements? I think not. In this exclusive 5-part Thycotic educational series we outline the privileged account security reports…


Demystifying the EU General Data Protection Regulation – Let’s BUST the Myths

July 10th, 2017

Yes, you’ve all heard about it. Many companies have been raising the alarm about GDPR for months now, all offering protection and silver bullets to solve anything and everything to do with GDPR—all you have to do is install this one box. Right! It’s caused a lot of confusion and many questions, and organizations have…


FERPA tells you what, but not how: The first step to being compliant today

April 26th, 2017

In the 1970s the US Government introduced the Family Education Rights and Privacy Act (FERPA).  In short, the act provides guidelines and regulations for when and how an academic institute can share student/parent records with those record owners and 3rd parties.  Much like other regulations (such as HIPAA and PCI), technology continues to have a…


The Top Three Ways Personally Identifiable Information is Leaked in Healthcare

March 3rd, 2015

Personally identifiable information (PII) related to healthcare data is 50x more valuable on the black market than credit card data according to Alert Logic. Forty three percent of all identity thefts in the United States in 2013 were accounted to medical related identity theft (Logic, 2014). The healthcare industry knows they need to protect PII. It’s…


Streamline Compliance with your Internal Security Policy by using Secret Server

March 4th, 2014

Incorporating a new tool into your company’s overall security architecture can be a tricky and time-consuming process. Fortunately, Thycotic Secret Server has a several features that streamline the process of complying with your existing corporate requirements. In this post, we will take a look at a few ways Secret Server can work in conjunction with…


4 Steps to HIPAA Compliance with Privileged Identity Management

February 11th, 2014

HIPAA, or the Health Insurance Portability and Accountability Act, is meant to protect specific health information gathered and used by the healthcare industry. Many people are familiar with how HIPAA affects their privacy as individuals, but not everyone may know how HIPAA shapes an organization’s security practices. A recent breach at St. Joseph Health Center…