+1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘Cyber Security’

Ostriches, Zero Day Exploits, and the Elusive CyberSec Expert: Why SMBs Should Implement Cloud-Based PAM

October 2nd, 2018

Small and medium-sized businesses (SMBs) face a cyber security trifecta. Cyber criminals are increasingly targeting the most vulnerable businesses (not just the biggest fish). Sophisticated attackers quickly take advantage of newly revealed vulnerabilities. And, cyber security professionals are in short supply. Maybe SMBs aren’t aware that they can use the same types of security systems…


The Black Hat 2018 Hacker Survey Report and Recap by Thycotic

September 18th, 2018

Another Black Hat conference has come and gone and more than 17,000 international security professionals converged on Las Vegas, USA to learn, share, educate and disclose security research on the latest cyber threats, attacks, vulnerabilities and techniques used to bypass the security employed by most governments and organizations globally. Of course, Thycotic’s team was there,…


Hacking the US Elections: How Government Agencies Can Protect Themselves

August 24th, 2018

The US midterm elections campaigns are well under way and expected to be held on Tuesday, November 6, 2018.  This midterm election is significant as it will take place right in the middle of President Trump’s first term and will likely be an indicator of the US citizens’ confidence in both the President and the…


The 6 Most Disturbing Data Breaches In 2018 So Far

July 31st, 2018

You could argue that all cyber-attacks and data breaches are disturbing, and you wouldn’t be wrong. But all too often a cyber-incident comes along that hits a whole new level of intrusion or includes an unsettling component of cyber security neglect that causes us to raise our eyebrows higher than usual. These data breaches stood…


Complex Cyber Security Tools Aren’t Just Painful, They are Downright Dangerous

July 24th, 2018

Securing your company is a big job. People are counting on you to stay one step ahead of cyber criminals and keep them safe. But, when the cyber security tools you rely on are too cumbersome to use, you can’t get your job done. We believe cyber solution providers have a responsibility to make your…


Top 10 Cyber Security Experts to Follow on Social in 2018

July 3rd, 2018

Feel like you’re experiencing cyber security overload? As a cyber security expert you must stay ahead, but it can be hard when there is so much noise. And it’s not like you can turn a blind eye—your company is relying on you to keep everything operating efficiently. And if that’s not enough pressure, you are…


The EU GDPR is now in effect. What has happened so far?

June 26th, 2018

Finally, the time has come. May 25th 2018 is now in the past, and the EU GDPR has come into effect after a two-year transition period. The earth is still rotating, the internet still kind of works. So what has happened, and have any lessons been learned yet? EU GDPR and Data Privacy Email SPAM…


Infosecurity Europe kicks off in London on June 5. Here’s how you’ll get the most out of it

June 5th, 2018

It’s the beginning of June and that means one thing in the cyber security professional’s calendar: Infosecurity Europe is here. Infosecurity Europe  is one of the largest cyber security events in Europe with over 400 exhibitors gathering to show off the latest in cyber security defense (and also some offensive capabilities) to about 20,000 cyber…


European Identity & Cloud Conference 2018: The Place Where the Digital Transformation is Alive

May 31st, 2018

Exhibitions and conferences focusing exclusively on the management and security of digital identities are rare in Europe. The European Identity & Cloud Conference, which leading analyst firm KuppingerCole has been organizing in Munich for twelve years now, is therefore even more important for the industry. Every year the EIC agenda focuses on the latest and…


2018 Cyber Security Breaches: Client Concerns, Opportunities for Solution Providers

May 29th, 2018

Cyber-criminal groups have an extensive arsenal of surveillance and research methodologies they use to search for even the smallest of vulnerabilities in your cyber security protections—vulnerabilities that enable them to infiltrate your organization, gather intelligence and access your systems. Thycotic’s 2018 Global Channel Partner Survey Report indicates that these cyber-criminals are largely successful. If your…