+1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘Cyber Security’

Symantec Internet Security Threat Report 2018: The Top Takeaways

April 17th, 2018

It has been a very interesting past year with a few surprises along the way, but as expected cyber-crime grew significantly; financial impact was huge and many companies struggled to recover from cyber-attacks. Cyber security—or the lack of it—is rapidly impacting everyone’s daily life and there is no longer a disconnect between personal and work…


Key takeaways from the 2018 Verizon Data Breach Investigations Report

April 12th, 2018

The latest installment of the Verizon Data Breach Investigations Report 2018 is now available. It’s the 11th edition of the report, and not surprisingly, it reveals that hackers have continued to be very successful at using their hacking techniques (many which are well known) and we have failed to stop them. “HACKERS CONTINUE TO USE…


RSA 2018: Top 5 Sessions You Can’t Miss

April 3rd, 2018

The USA 2018 RSA Conference is only a few weeks away and around 45,000 IT security professionals will be arriving in San Francisco to discuss one of the biggest risks and threats to our future, countries, economies and civilization. Yes, cyber security and how to prevent future cyber-wars will be one of the main topics…


Will Fake News Lead to the Next Cyber War?

March 16th, 2018

Fake news is running rampant across all media outlets. While you may not take them seriously, these untrue news stories are playing with your emotions and have serious security implications. With over half the world’s population online and using social media, news travels fast. And sometimes the wrong news gets spread. What happens when it’s…


New South Wales Government failure highlights critical nature of PAM

March 9th, 2018

The New South Wales Government’s cyber security strategy is under urgent review after Auditor’s Offices criticised the way its agencies are handling privileged access and other basic security practices. At the end of last year (20th December 2017) the government of New South Wales received an unwelcome Christmas present from its own Auditor’s Office. This…


Top 5 Ways to Win your CEO/CTOs Heart

February 13th, 2018

In today’s always-connected world it’s important to realize that, historically and traditionally, cybersecurity was the responsibility of the IT department. Any time a cyber incident or data breach occurred or security questions arose, these got deferred to IT for the answers. Failure to translate cyber risk into business risk has left many businesses clueless But…


Which of your endpoints is most likely to let an attacker inside?

February 6th, 2018

Is your organization trying to reduce the risk of malware or ransomware in 2018?  Knowing where to start can be the hardest part.  The following risk factors can increase the odds of a cyber attack, and being aware of them can help you focus on and secure your most vulnerable endpoints. Any machine that users…


Cybersecurity for Dummies Part 2: Responding in the Wake of a Cyber Attack

February 2nd, 2018

With cyber threats, it’s a matter of when and not if you’re going to be impacted. Some attacks are within your control, and some aren’t, so you need to be prepared for what to do when you do become a victim. Understanding the method of threats you face can help you identify any hack or…


Cybersecurity for Dummies Part 1: Making Cybersecurity Everyone’s Responsibility

January 30th, 2018

In our always-connected world where the private information of individuals and organizations is vulnerable to exposure and misuse, cybersecurity is everyone’s responsibility because hackers or malicious threat actors who steal proprietary information don’t care about age, gender, race, culture, beliefs, or nationality. They probe your digital footprint and your Internet-connected computers based on opportunity, often…


Data Privacy Day: Where has privacy gone, and will we ever get it back?

January 26th, 2018

Privacy is gone, but never forgotten. Can our current path even be reversed? Yes, the end of privacy as we know it is closer than you may think.  Privacy definitions are very different between nation states and cultures, though one common thread is that privacy is becoming less of an option for most citizens, globally.…