+1-202-802-9399 U.S. Headquarters

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘Cyber Security’

Black Hat Hacker Insights: What’s creating new opportunities for hackers?

August 15th, 2017

Fast-growing technologies are blurring the boundaries of the traditional perimeter and creating new opportunities for hackers. The traditional security perimeter protecting most organizations is proving to be an ineffective cyber security control today. Fast-growing technologies like Cloud, Mobile and Virtualization have made the boundaries of the organization blurry, and this has not gone unnoticed by…


Black Hat 2017 Survey: Hackers disclose your cyber security vulnerabilities

August 9th, 2017

With the start of Black Hat USA 2017, the annual conference turned 20, and more than fifteen thousand executives, security professionals and experts from all around the world arrived in Las Vegas to share experiences and ideas on one of the most formidable security issues facing the world today: cyber security.   It was a…


5 Security Policies every CISO Must Enforce Now

July 20th, 2017

Chief Information Security Officers, CISOs, bear some of the heftiest weights on their shoulders of anyone in an organization. Single-handedly, depending on their security policies and the enforcement of them, they can be responsible for the success or downfall of an entire company. It is, literally, a thankless position because usually nobody says a word…


Part 3: How did my password get hacked? It’s this easy…

June 6th, 2017

This is the 3rd part in a 3-part series on how hackers are using simple methods to steal your passwords. In part 1 we talked about how hackers used passwords that were discovered in a previous breach in order to attempt a secondary breach. In part 2 we talked about the use of malicious scripts…


Part 2: How did my password get hacked? It’s this easy…

May 24th, 2017

I’ll pick up where we left off in Part 1: How did my password get hacked? That’s where I explained that the reason your account was hacked was probably NOT due to some sophisticated state actor from China or Russia. So to recap, the top three reasons your password was hacked were most likely: You had a different account…


Oops! Your files have been encrypted! How to avoid that dreaded Ransomware Message

May 17th, 2017

Even People Who Know Better Fall Prey to Cyber Attacks. After all, it wasn’t a bunch of Facebook junkies or six-year-olds who clicked on the e-mail links that launched WannaCry (also known as WannaDecryptor) ransomware attacks that infected computers in as many as 150 countries. Instead professionals in the workplaces of the world were caught off-guard…


#DontCry with #WannaCry – Do not become the next victim of Ransomware

May 16th, 2017

Ransomware has become a major threat and high risk to many individuals and organizations worldwide. It is a very destructive variant of malicious malware. When it impacts systems it makes critical systems and sensitive information inaccessible until a ransom is paid. Ransom is typically is paid via bitcoins within 72 hours and if unpaid the…


How mature is Australia really, when it comes to cyber security?

May 16th, 2017

Guest blog post by emt Distribution.  According to The Australian Strategic Policy Institutes’ report on Cyber Maturity in the Asia-Pacific Region (2016), Australia is ranked at 4th place, one up from the weighted scores in 2015. Who’s doing better? The US, South Korea, and Japan, followed by Singapore, then New Zealand. So why are we not ranked…


Ransomware: Threats, Impact and Expert Recommendations on How to Defend Against It

May 15th, 2017

The massive ransomware infection that spread across computers in over 99 countries on Friday, May 12th 2017, crippling hospitals and businesses, demonstrated how devastating a cyber attack can be on a global level. The timing of this ransomware attack is no coincidence, as many European organizations were wrapping up their day, only to find out…


Stop Blaming China & Russia for All Your Cyber Attacks Pt. 1

May 1st, 2017

In this two part series we will first debunk the 5 myths of sophisticated cyber attacks and then cover the ‘reality’ behind cyber criminal’s attacks and give you actionable cybersecurity hygiene steps to increase your security.  Cyber-attacks can originate from anywhere, but there appears to be an unabated trend of pointing the finger at either “sophisticated…