+1-202-802-9399 U.S. Headquarters

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘Cyber Security’

Stop storing cleartext credentials in the registry for Point of Sale systems

November 30th, 2017

Do you want to enable auto logon on your PoS systems without compromise? Do you need to enable auto logon for a seamless buying experience for your customers, but you’re doing it in an unsecure way? Well, Thycotic’s Secret Server has the answer, with complete automation, and without storing credentials in cleartext. Let’s talk about…


A fresh coat of paint over rust does not reduce complexity or improve customer experience

November 29th, 2017

I have been in the industry for a long time with more than 25 years’ experience in building proven security products, and sharing my cybersecurity knowledge, to help companies reduce the risk against cyber threats. One thing I have found in this vast evolving cybersecurity industry is that complexity and security do not mix, if…


NYS DFS 23 NYCRR PART 500: What is it and when is the compliance deadline?

November 9th, 2017

What is DFS 23 NYCRR PART 500? 23 NYCRR PART 500 is a regulation that establishes cybersecurity requirements for financial services companies. The concept of cybersecurity is nothing new, and regulations or compliance mandates around cybersecurity are nothing new either.  At its core, cybersecurity is all about protecting your organization’s data and network from malicious…


Protecting Critical Infrastructure from Cyber Threats

November 1st, 2017

Today we are truly living in the world of IoT—the Internet of things—with approximately 9 billion things, or devices, connected to the internet, many of which are powering and enabling our critical infrastructure. Every day billions of employees power up their devices and connect to the internet to plug into their everyday world, all of…


5 Scary Data Breaches – What is your Nightmare Cyber Hack Attack?

October 31st, 2017

Bad stuff happens. Bad, b-a-a-d stuff. It happens in the real world, and now it happens in the cyber world too. And it’s only a matter of time before—gasp!—it happens to you. I’m talking about a gruesome hack-attack. You may get targeted directly by hack-monsters lurking online; or you may become the helpless victim of…


Cyber Security Awareness Month: The Internet Wants YOU! Consider a Career in Cyber Security

October 19th, 2017

Cyber security is no longer just a technology challenge. It’s a challenge for everyone who uses and interacts with technology daily.  The protection and security of both your work and personal life are no longer separate—they are thoroughly intertwined thanks to the evolving trends of social networks, the internet of things, and unlimited connectivity.  Cyber…


Cyber Security Awareness Month: 5 Predictions for Tomorrow’s Internet

October 18th, 2017

The matter of cyber security is rapidly becoming part of everyone’s daily life. But you can no longer keep your personal and work security habits and precautions separate. In the past cyber-attacks were usually only a concern in the workplace, but today cyber-attacks are so common they affect everyone connected to the internet. Cyber-attacks are…


Cyber Security Awareness Month: Cyber Security in the Workplace is Everyone’s Responsibility

October 10th, 2017

Cyber security is no longer just a technology challenge—it’s a challenge for everybody who uses and interacts with technology daily. That means: everybody in your organization. Cyber security is no longer just the responsibility of the IT department The protection and security of employees’ work and personal lives are no longer separate. They have been…


Cyber Security Awareness Month: 6 Simple Steps to Online Safety

October 3rd, 2017

Why do we continue to see so many cyber breaches in spite of our heightened awareness?  When we examine why many of the breaches in recent years have occurred, we can identify three major culprits: the Human Factor, Identities and Credentials, and Vulnerabilities. As a digital social society we are sharing more information publicly, causing…


How one of the most well known cyber security organizations in the world benefited from privileged account management

September 26th, 2017

Any Privileged Account Management (PAM) solution that you purchase, whether it’s from Thycotic or elsewhere, is nothing more than a tool to help you secure your infrastructure.  That’s a key thing to remember, because as a tool it will not do the job for you, nor suddenly make your organization secure if you do not…