Phone Number +1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘Cyber Security Hot Topics’

Think Differently About Unix / Linux Privilege Management

June 30th, 2020

Security models have struggled to match the evolution of Unix. Over its long history, Unix has evolved and changed in many different ways. What started in Bell Labs 40 years ago has spawned more than 150 variants of Unix in use today. Unlike the linear progression of Windows operating systems, in which most organizations use…


5 Top Takeaways from the Verizon Data Breach Investigations Report 2020

June 17th, 2020

The latest Verizon Data Breach Investigations Report 2020 is now publicly available to download or read online. As one of the industry’s top cyber security reports, the 13th Edition of the Verizon Data Breach Investigations Report (DBIR) is one of our leading indicators of what causes security incidents and why data breaches occur.  With researchers…


Endpoint Security Demands a Defense-in-depth Strategy

June 16th, 2020

Endpoints, the devices people use to access company resources, are a weak spot in corporate security. Compromised endpoints are a primary access point that cyber criminals use to infiltrate a network. Two-thirds of companies are compromised by exploits that originate with an endpoint. The volume of endpoint attacks is rising, as is the sophistication of…


DevOps Secrets Vault and Dynamic Secrets in the Cloud

May 19th, 2020

Back in July of 2019, Thycotic released DevOps Secrets Vault, a high-velocity vault for high-speed password and secret creation, archiving, and retrieval. Each month we roll out improvements to this cloud-based tool. In 2020, we’ve been focused on adding dynamic secrets for key cloud platforms. For infrastructure-as-a-service platforms dynamic secrets in DevOps Secrets Vault offer…


How can you prevent insider threats when none of your insiders are actually “inside”?

May 12th, 2020

Security teams can be so focused on blocking cyber attacks from outside that they turn a blind eye to potential threats within their own organizations. In fact, 34% of all breaches are caused by insider threats. Insider threats are uniquely difficult to defend against because insiders inherently require an elevated level of trust and access…


How Do Passwords Work?

May 7th, 2020

If you want to make a purchase, post a comment in a forum, or even read content on many websites, you’re prompted to create (and remember!) a password. What’s going on when you create a password? And how does this process help keep your information safe? When you create a password on a website, that…


5 Most Popular Password Cracking Tools: Protect Your Enterprise

April 28th, 2020

Passwords. How on earth did we get here?  They've been around for so many years and yet there’s still so much to be said about them. In most organizations passwords are what make the difference between keeping cyber criminals out—and falling victim to a cyber-attack. And for the multitude of applications, systems and infrastructure of…


Best Practices and Cyber Security Tips for Working Remotely

March 16th, 2020

Given the unusual recent circumstances, many employees around the world are finding themselves in a situation where they must work from home or remotely. I’ve been working remotely for about 15 years, so I thought it would be great to share some of my experiences, cyber security best practices and tips, and lessons learned on…


A Guide to Managing and Securing Privileged Users

March 3rd, 2020

Organizations often have two to three times more privileged user accounts than individual employees. Securing these special accounts is vital to protecting sensitive information and critical systems from cyber attack. To help people stay productive, you must provide appropriate access for privileged users while also minimizing risk. Privileged users require special handling, training, and oversight.…


The CISO Research Report: CISOs thrive on being Guardians of the Business and maybe even the Galaxy

February 18th, 2020

Is Data the new Oil? Some people maintain that "Data is the new oil". Tech companies around the world are now ranking among the largest global companies. A number of them have values that exceed some countries' GDP.  Tesla, some would argue, is a tech company that builds cars. It now has a market value…