+1-202-802-9399 U.S. Headquarters

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘Cyber Security’

Cyber Security Awareness Month: 5 Predictions for Tomorrow’s Internet

October 18th, 2017

The matter of cyber security is rapidly becoming part of everyone’s daily life. But you can no longer keep your personal and work security habits and precautions separate. In the past cyber-attacks were usually only a concern in the workplace, but today cyber-attacks are so common they affect everyone connected to the internet. Cyber-attacks are…


Cyber Security Awareness Month: Cyber Security in the Workplace is Everyone’s Responsibility

October 10th, 2017

Cyber security is no longer just a technology challenge—it’s a challenge for everybody who uses and interacts with technology daily. That means: everybody in your organization. Cyber security is no longer just the responsibility of the IT department The protection and security of employees’ work and personal lives are no longer separate. They have been…


Cyber Security Awareness Month: 6 Simple Steps to Online Safety

October 3rd, 2017

Why do we continue to see so many cyber breaches in spite of our heightened awareness?  When we examine why many of the breaches in recent years have occurred, we can identify three major culprits: the Human Factor, Identities and Credentials, and Vulnerabilities. As a digital social society we are sharing more information publicly, causing…


How one of the most well known cyber security organizations in the world benefited from privileged account management

September 26th, 2017

Any Privileged Account Management (PAM) solution that you purchase, whether it’s from Thycotic or elsewhere, is nothing more than a tool to help you secure your infrastructure.  That’s a key thing to remember, because as a tool it will not do the job for you, nor suddenly make your organization secure if you do not…


Most Companies Worldwide Fail to Measure Cybersecurity Effectiveness and Performance

September 20th, 2017

More than half the 400 respondents in a survey from the Thycotic-issued study, “2017 State of Cybersecurity Metrics Report”, scored an F or a D grade after evaluating their organization’s efforts to measure their cybersecurity investments and performance against best practices. 58% received an F or D grade Joseph Carson of Thycotic: “It’s astonishing to…


What is PuTTY and what’s new with it in 2017?

September 7th, 2017

  What is PuTTY? PuTTY is an open source application that allows you to connect remotely to many different types of systems, over various communication protocols.  However, PuTTY is most famously used for SSH connects from Windows systems to Unix based systems.  This application allows you to connect your private SSH keys and enter passphrases…


SANS 2017 Threat Landscape: highlights of the cyber threat survey

August 24th, 2017

The latest SANS 2017 Threat Landscape Survey has been released—the theme of the survey is ‘Users on the Front Line’. In summary, the survey results indicate that Endpoints and Users are on the front line in the battle against cyber threats. This reiterates Thycotic’s message that the traditional cyber security perimeter is no longer the…


Black Hat Hacker Insights: The easiest way hackers access your sensitive data

August 17th, 2017

Hackers claim that compromised privileged accounts are their quickest route to your sensitive data. We asked nearly 300 hackers “What is the fastest route to getting access to an organization’s sensitive data? The response was that it’s a toss-up between privileged accounts and compromised email accounts, both of which can hold a trove of sensitive…


Black Hat Hacker Insights: What’s creating new opportunities for hackers?

August 15th, 2017

Fast-growing technologies are blurring the boundaries of the traditional perimeter and creating new opportunities for hackers. The traditional security perimeter protecting most organizations is proving to be an ineffective cyber security control today. Fast-growing technologies like Cloud, Mobile and Virtualization have made the boundaries of the organization blurry, and this has not gone unnoticed by…


Black Hat 2017 Survey: Hackers disclose your cyber security vulnerabilities

August 9th, 2017

With the start of Black Hat USA 2017, the annual conference turned 20, and more than fifteen thousand executives, security professionals and experts from all around the world arrived in Las Vegas to share experiences and ideas on one of the most formidable security issues facing the world today: cyber security.   It was a…