Phone Number +1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘For CISOs’

12 Days of Privileged Access Management Giveaways

December 3rd, 2019

The more things change, the more they stay the same. We pride ourselves on pushing the envelope, finding new ways to do things, and solving the next cyber puzzle. But when it comes to this time of year, we love our Thycotic traditions. The 12 Days of Thycotic is one of those annual rituals that…


Privileged Access Management 2019: A Year in Review

November 19th, 2019

Another year has passed, and cyber attacks did not take a vacation or enjoy any time off. Cyber attacks wreak havoc on businesses 24/7. And cyber threats constantly increase and evolve, so organizations must adapt to become resilient to the newest threats. Not all successful cyber attacks are sophisticated This year confirmed that not all…


Why Usable Security Should Drive Your Decision in Selecting a PAM Tool for Your Organization

November 5th, 2019

What is Usable Security At Thycotic ease of use has been a consistent focus with our products, but we have started to use the term Usable Security more frequently. Usable security is much more than a Thycotic marketing term. Usable security is an academic field of study that evaluates the usability of computer security. We…


Limit access for third-party vendors without restricting their ability to get work done

October 22nd, 2019

Companies often work with outside experts, consultants and other third-party vendors who need privileged access to corporate resources. These third-party entities can’t do what they were hired to do if their access is too restrictive. You can’t maintain a strong security posture if access and oversight are too lax. How do you, a security professional,…


The Real Cost of PAM Software

October 1st, 2019

A low price tag for PAM software doesn’t necessarily mean it’s the best overall value. Enterprise-scale PAM, like most software purchases, typically involves more than the initial license fee. Depending on your security goals, internal resources, and specific IT environment, you may need to plan for additional costs. It’s important to identify the total cost…


Before the Breach: Leveraging PAM and VPAM solutions to protect privileged credentials

August 27th, 2019

This is a guest blog written by Tony Howlett, CISO at SecureLink. Tony is a published author and speaker on various security, compliance, and technology topics. He also serves as President of (ISC)2 Austin Chapter and is an Advisory Board Member of GIAC/SANS. CISOs and their security teams have an impossible task; they must predict…


Building a PAM business case: cost-justifying privileged access management projects

August 13th, 2019

Most IT or security projects require a formal approval process, and that often includes a written business case. An IT business case document can vary from a simple one-page write-up to a full-blown justification paper with detailed cost and return-on-investment calculations. Many organizations have standard business case templates, but here’s what type of information a…


How to Find Your Best Match Among Privileged Access Management Vendors

August 6th, 2019

So, you want to bring on a PAM solution and you’re either selecting a Privileged Access Management vendor for the first time, or you may be “upgrading” from a typical password manager software product.  In any case, you’re probably looking for several PAM capabilities, as well as how best to deploy your proposed PAM solution:…


Top 5 Black Hat 2019 Sessions Not to Miss. Plus: Bonus Travel Tips to Hacker Cons

August 1st, 2019

The Black Hat USA 2019 conference is about to start. Over 17,000 security professionals will come from all around the world to Las Vegas, USA. They will learn, share, educate and disclose security research on the latest cyber-threats and attacks, vulnerabilities, and techniques used to bypass security used by most governments and organizations globally. Without…


Top 10 Best Cyber Security Podcasts of 2019

July 9th, 2019

Podcasts have transformed the way we digest news, learn on the go, and optimize our commutes. With podcasts gaining popularity due to their ability to fit into our busy lives, a wave of new cyber security experts have launched a series of IT podcasts to keep us informed about the latest security threats, InfoSec tools,…