+1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘For CISOs’

Incident Response: Are You Breach-Ready?

August 28th, 2018

It’s no longer rare to see cyber-attacks in the daily news. From ransomware to data breaches to DDoS (Distributed Denial of Service) attacks, the incident is usually attributed to either cyber criminals or nation states, and almost always comes from beyond our own country’s borders and laws. Because of this, we worry about clicking on…


Privileged Account Management and Identity Access Management: Same Family, Different Strengths

August 14th, 2018

From a cyber criminal’s point of view, obtaining privileged account information has the highest ROI of any attack strategy. A malicious actor with privileged account passwords in hand could infiltrate key databases and access highly sensitive data. To obtain this information, attackers use increasingly sophisticated tools and social engineering techniques which are extremely difficult for…


What Every CISO Wants Their Employees to Know About Cybersecurity

May 15th, 2018

CISO’s have an incredibly important role to fill. One of their biggest responsibilities is empowering employees to recognize and understand how to respond to cyber attacks they face in their daily work and personal lives. With cybersecurity fatigue, it can be difficult to decide which information to focus us. In this video, you will learn…


2018 Global State of Privileged Access Management Risk and Compliance: Part 1

April 26th, 2018

Most companies are FALLING SHORT on compliance when it comes to privileged accounts! Thycotic’s research shows Privileged Access Management is a Top Risk and Compliance requirement, yet it’s significantly failing to be fully implemented meaning that most companies fall short on compliance for privileged access. The majority of organizations begin to implement Privileged Access Management…


RSA Conference 2018: A secure internet starts with YOU, and it’s everyone’s responsibility

April 24th, 2018

It was another quiet morning, though this might have been because it was around 5am in the morning and I was still struggling to adjust to the time zone change from Tallinn, Estonia to San Francisco—a measly 10 hours.  I knew the days that lay ahead would be interesting but fun.  Yes, it is that…


RSA 2018: Top 5 Sessions You Can’t Miss

April 3rd, 2018

The USA 2018 RSA Conference is only a few weeks away and around 45,000 IT security professionals will be arriving in San Francisco to discuss one of the biggest risks and threats to our future, countries, economies and civilization. Yes, cyber security and how to prevent future cyber-wars will be one of the main topics…


New South Wales Government failure highlights critical nature of PAM

March 9th, 2018

The New South Wales Government’s cyber security strategy is under urgent review after Auditor’s Offices criticised the way its agencies are handling privileged access and other basic security practices. At the end of last year (20th December 2017) the government of New South Wales received an unwelcome Christmas present from its own Auditor’s Office. This…


Privileged Behavior Analytics Deep-Dive: Responsive Actions

February 27th, 2018

Privileged Behavior Analytics Recap Thycotic’s Privileged Behavior Analytics (PBA) software monitors user activity within Secret Server to detect anomalous behavior.  Once the user’s baseline activity is determined, deviations from that behavior can trigger alerts or warnings to notify security admins.  The software’s machine learning considers the time of day, IP address, user history, Secret importance,…


Which of your endpoints is most likely to let an attacker inside?

February 6th, 2018

Is your organization trying to reduce the risk of malware or ransomware in 2018?  Knowing where to start can be the hardest part.  The following risk factors can increase the odds of a cyber attack, and being aware of them can help you focus on and secure your most vulnerable endpoints. Any machine that users…


Majority of Companies are failing at cyber security metrics, and investing blindly

November 22nd, 2017

Thycotic has released the research results from its Security Measurement Index survey. The resulting “2017 State of Cyber Security Metrics Annual Report“ identifies how companies worldwide are measuring the effectiveness and success of their cyber security management strategy. The report is far from comforting Companies and governments world-wide are often just one click or one…