Phone Number +1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘For CISOs’

5 Top Takeaways from the Verizon Data Breach Investigations Report 2020

June 17th, 2020

The latest Verizon Data Breach Investigations Report 2020 is now publicly available to download or read online. As one of the industry’s top cyber security reports, the 13th Edition of the Verizon Data Breach Investigations Report (DBIR) is one of our leading indicators of what causes security incidents and why data breaches occur.  With researchers…


Insurance Leader Rolls Out Enterprise PAM Strategy

June 11th, 2020

One of my favorite parts of this job is speaking with our customers to understand why they chose our solutions, and how they are using them to solve their challenges. Recently, I spoke with one of our customers who described Secret Server as his “favorite security tool!” So, I thought I would share his story.  Insurance Leader…


A New Approach to Modern Enterprise Access Management

June 4th, 2020

Earlier this week, we publicly announced the acquisition of Onion ID—a San Francisco-based identity and privileged access management (PAM) company. The acquisition marks a significant milestone in Thycotic’s strategic direction as a PAM company. Over the past several years, we have driven innovation through a multi-stage product roadmap designed to help companies adopt PAM and…


Addressing emerging PAM use cases to protect access to SaaS applications, cloud infrastructure, and databases

June 2nd, 2020

With most of the global, white-collar workforce suddenly shifting to working remotely, cloud technology has emerged as a critical component to keep businesses up and running. These services are enabling people to collaborate with one another, and provide the tools they need to stay productive, enhance accessibility and create a mobile friendly environment while working…


Thycotic named leader in new KuppingerCole Leadership Compass

May 8th, 2020

Why innovation has become so important to Privileged Access Management As noted in the 2020 KuppingerCole Leadership Compass, Privileged Access Management (PAM) is one of the fastest growing areas of cyber security today. Forty PAM vendors now compete for annual revenues that will total $2.2 billion this year and will more than double to $5.4…


Privileged Access Management: The Great Cloud Migration

March 31st, 2020

Migrating your PAM instance to the cloud can look from the outset like a pretty daunting task. How, exactly, do you go about transporting what may be years of data and highly sensitive information to a new home? It’s often said that migrating to the cloud is like moving houses, and that’s one of the…


Building the Case for Privileged Session Management

March 17th, 2020

You simply can’t be everywhere at once. How can you keep tabs on your most sensitive and critical systems? If only you had eyes in the back of your head. Even organizations with well-documented PAM policies don’t simply trust that people are doing the right things Privileged session management increases oversight and accountability so you…


Lessons we’ve learned: the EU NIS directive and securing critical infrastructure

March 10th, 2020

What is NIS? The Networks & Information Systems (NIS) Directive was created by the European Union (EU) with the specific aim of raising levels of overall cyber security and network resilience for critical infrastructure. NIS improves overall EU cyber security by driving organizations to adopt enhanced security for critical infrastructure. The NIS Directive & Critical…


The CISO Research Report: CISOs thrive on being Guardians of the Business and maybe even the Galaxy

February 18th, 2020

Is Data the new Oil? Some people maintain that "Data is the new oil". Tech companies around the world are now ranking among the largest global companies. A number of them have values that exceed some countries' GDP.  Tesla, some would argue, is a tech company that builds cars. It now has a market value…


8 Signs you’re outgrowing your PAM System and what to do next

February 11th, 2020

Growth is a great problem to have. Suddenly you’re onboarding lots of people, launching products and signing off on new projects. It can also be stressful. Your company is looking to you to keep IT systems running smoothly and securely.  As your company grows, the security tools you’ve been using need to keep up with constant…