Phone Number +1-202-802-9399 (US)

Thycotic is now Delinea!   delinea.com

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘Cyber Security Hot Topics’

How to Create an IT Disaster Recovery Plan: The Ultimate Guide

September 20th, 2022

Many organizations today are highly vulnerable to downtime since they lack optimized and reliable disaster recovery plans. In fact, Gartner reports that 72% of organizations are not well-positioned for disaster recovery. Without a robust IT disaster recovery plan in place, businesses risk significant and prolonged operational failure, data loss, and revenue loss.


Conversational Geek teaches you cyber insurance 101

September 6th, 2022

If your business gets hit by a serious cyberattack, is it game over? Thanks to cyber insurance, this doesn’t have to be the case. Cyber insurance, like auto or home insurance, reimburses the policyholder for losses incurred from a cyberattack. Sounds great, right? Well, the issue facing businesses looking to get cyber insurance is that…


Global Benchmark Report: Companies Have a Long Way to Go to Protect Privileged Identities and Access

August 9th, 2022

Privileged Identities remain the most sought-after attack vector for cybercriminals. Threat actors are increasingly searching for weak entry points they can exploit to access private systems and applications. Unfortunately, many businesses lack the proper identity verification mechanisms and strategies needed to thwart incoming attacks—making them highly vulnerable to cyber threats.


Delinea Named a Leader Again in the 2022 Gartner® Magic Quadrant™ for Privileged Access Management

July 22nd, 2022

I’m very proud to share that Delinea has been named a Leader in the 2022 Gartner Magic Quadrant for Privileged Access Management (PAM). Download the Report: https://delinea.com/resources/gartner-magic-quadrant-pam


Passwordless authentication: making the vision a reality

July 5th, 2022

The concept of passwordless authentication has been getting a lot of hype. And for good reason. The human element accounts for most data breaches, with 82% stemming from stolen passwords, phishing, misuse, and errors. The idea that users wouldn’t need to create and remember complex passwords, store them in a password vault, or regularly change…


Key Takeaways from the Verizon Data Breach Investigations Report 2022

June 28th, 2022

Every year I anxiously await the publication of the Verizon Data Breach Investigations Report (DBIR). This annual tome is a virtual Mecca that draws a worldwide audience of security practitioners. We savor its insights and analysis of information security incidents and breaches. Heavy on data gleaned from actual investigations, it can be a little dry…


Secure Remote Access Paradigms Pros and Cons

June 14th, 2022

Remote users expect instant connectivity so they can access the same systems they use when in the office. However, increasingly complex hybrid cloud, multi-cloud, and on-premise infrastructures make remote privileged access more difficult for IT teams to manage and secure using traditional access management techniques. Therefore, enterprises need a flexible, easy-to-use method for secure remote…


Conversational Geek shows you how to contain the blast radius of a server attack

May 31st, 2022

Cybersecurity insiders love jargon. The language in most cybersecurity whitepapers and webinars is just as tangled and opaque as legacy tech in a typical IT environment. That’s why it’s no wonder cyber leaders have such difficulty building a common understanding with other technical teams, business users, and company leadership. It’s also no wonder many people…


Top 5 RSA Sessions to Attend, The New Human Perimeter and Travel Tips to Survive

May 24th, 2022

It is that time of the year again for RSA Conference 2022, a bit later than expected but better late than never. It’s our opportunity for the global security community to come together and learn about the latest cybersecurity threats, security trends, innovations, and best practices to become more resilient against cyber-attacks. This year’s theme…


Cyber Insurance Case Studies: A Tale of Two Customers

May 17th, 2022

Delinea customers have been talking a lot about cyber insurance. Where to get it, what’s covered, and how to reduce their rates. We’ve been working with a variety of partners throughout the cyber insurance ecosystem to make sure our customers are well prepared to procure the right policy for them. Among Delinea customers, two recent…