+1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘Cyber Security’

Cyber Security Incident Response and Reporting Process

March 19th, 2019

Ever since we launched our customizable cyber security incident response template, I’ve been amazed by its volume of downloads. I quickly realized that the increasing cyber threats from criminal hackers, malware and ransomware is starting to be taken seriously by organizations large and small, and that there is a growing demand for guidance and information…


New Hire Onboarding Checklist: A CISO’s Perspective

March 12th, 2019

When a new employee enters an organization there are various behind-the-scene activities that must take place to ensure the new hire an efficient onboarding experience. Many are administrative in nature and are taken care of by HR. But then there are those related to cyber security—and they are far too often overlooked. As a security…


Joseph Carson’s Top 5 Sessions to Attend at RSA Conference 2019

February 26th, 2019

RSA Conference 2019 will take place March 4th – 8th in San Francisco at the Moscone Center.  The theme this year is ‘Better’. Not exactly a warm, exciting theme for security professionals—it implies that we need to do better and work harder. My mind always tells me to work smarter and stay focused.  But there’s…


Top 5 Top Cyber Security Predictions for 2019

December 24th, 2018

Cyber security was a major topic in 2018 as the compromise of elections and voting machines was at the top of everyone’s minds. Given the critical impact of the midterm elections on future governance, election security is a major concern. It’s especially concerning after it was demonstrated at DEF CON how voting machines could be…


Ostriches, Zero Day Exploits, and the Elusive CyberSec Expert: Why SMBs Should Implement Cloud-Based PAM

October 2nd, 2018

Small and medium-sized businesses (SMBs) face a cyber security trifecta. Cyber criminals are increasingly targeting the most vulnerable businesses (not just the biggest fish). Sophisticated attackers quickly take advantage of newly revealed vulnerabilities. And, cyber security professionals are in short supply. Maybe SMBs aren’t aware that they can use the same types of security systems…


The Black Hat 2018 Hacker Survey Report and Recap by Thycotic

September 18th, 2018

Another Black Hat conference has come and gone and more than 17,000 international security professionals converged on Las Vegas, USA to learn, share, educate and disclose security research on the latest cyber threats, attacks, vulnerabilities and techniques used to bypass the security employed by most governments and organizations globally. Of course, Thycotic’s team was there,…


Hacking the US Elections: How Government Agencies Can Protect Themselves

August 24th, 2018

The US midterm elections campaigns are well under way and expected to be held on Tuesday, November 6, 2018.  This midterm election is significant as it will take place right in the middle of President Trump’s first term and will likely be an indicator of the US citizens’ confidence in both the President and the…


The 6 Most Disturbing Data Breaches In 2018

July 31st, 2018

You could argue that all cyber-attacks and data breaches are disturbing, and you wouldn’t be wrong. But all too often a cyber-incident comes along that hits a whole new level of intrusion or includes an unsettling component of cyber security neglect that causes us to raise our eyebrows higher than usual. It’s important to talk about…


Complex Cyber Security Tools Aren’t Just Painful, They are Downright Dangerous

July 24th, 2018

Securing your company is a big job. People are counting on you to stay one step ahead of cyber criminals and keep them safe. But, when the cyber security tools you rely on are too cumbersome to use, you can’t get your job done. We believe cyber solution providers have a responsibility to make your…


Top 10 Cyber Security Experts to Follow on Social in 2018

July 3rd, 2018

Feel like you’re experiencing cyber security overload? As a cyber security expert you must stay ahead, but it can be hard when there is so much noise. And it’s not like you can turn a blind eye—your company is relying on you to keep everything operating efficiently. And if that’s not enough pressure, you are…