+1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘For CISOs’

Your city does not have to be a victim of ransomware

June 11th, 2019

These cities have a common foe. Albany, New York; Baltimore, Maryland; Orange County, N.C.; Sammamish, Wash; Atlanta, GA They have all been subject to Ransomware attacks in the past 12 months. The most recent victim being Baltimore, MD which has been the target of ransomware twice in the past year. According to the 2019 Verizon Data Breach Investigations…


The Redesign of Secret Server: What went into making Secret Server this good?

June 4th, 2019

We are excited to introduce the redesign of Thycotic Secret Server! In 2019, Thycotic has invested heavily in UX. We have built a team of UX and Human Computer Interaction Specialists to lead these initiatives. We are improving the UX/UI of all Thycotic products in 2019 as we continue in our efforts to remain the…


Key Takeaways from the 2019 Verizon Data Breach Investigations Report

May 21st, 2019

The Verizon Data Breach Investigations Report 2019 is now publicly available to download or read online. It’s the 12th edition, and not surprisingly, it reveals that cyber criminals are still successfully using their hacking techniques—many of which are very common—and that we have failed to stop them. However, we are getting better at stopping them.…


KuppingerCole weighs in on Privileged Access Management vendors in new report

April 23rd, 2019

Analyst firm KuppingerCole just released a new report— Leadership Compass March 2019 Vendor Evaluation for Privileged Access Management (PAM).  Over more than 60 pages, KuppingerCole analyst Anmol Singh provides a thorough review of 20 PAM vendors in a rapidly growing PAM market. He emphasizes, “PAM has emerged as one of the most crucial IAM technologies that…


The Evolution from Password Managers to Privileged Access Management. Which is right for you?

April 2nd, 2019

Start by performing your own Business and Data Impact Assessment to determine the most critical data and assets, then align them to your privileged accounts and privileged access. In Summary: Privileged Access Management is the new cyber security perimeter and a very effective solution—it is significantly reducing organizations’ risks from cyber-attacks and insider abuse. PAM…


Cyber Security Incident Response and Reporting Process

March 19th, 2019

Ever since we launched our customizable cyber security incident response template, I’ve been amazed by its volume of downloads. I quickly realized that the increasing cyber threats from criminal hackers, malware and ransomware is starting to be taken seriously by organizations large and small, and that there is a growing demand for guidance and information…


New Hire Onboarding Checklist: A CISO’s Perspective

March 12th, 2019

When a new employee enters an organization there are various behind-the-scene activities that must take place to ensure the new hire an efficient onboarding experience. Many are administrative in nature and are taken care of by HR. But then there are those related to cyber security—and they are far too often overlooked. As a security…


Actions CISOs Must Take to Overcome Negative Perceptions

February 12th, 2019

Chief Information Security Officers (CISOs) shoulder tremendous responsibility. They’re ultimately responsible for their company’s cyber security posture. At the same time, the security decisions they make also impact core business metrics such as productivity, cost savings, revenue growth, and brand perception. The world of today’s CISOs is a balancing act. On one hand, they are…


How the just-released Forrester Wave PIM Q4 2018 Report can help you find the right PAM vendor

February 5th, 2019

As awareness about the importance of Privileged Access Management (PAM) and Privileged Identity Management (PIM) increases, (Gartner called it a top priority for cyber security in 2018), executives, IT security and operations teams are evaluating multiple options when selecting a PAM or PIM solution that would be best for their organizations. That means independent analysis…


Privileged Access Management Compliance Through the Eyes of an Auditor

January 8th, 2019

Compliance audits are a stressful, time-consuming effort for many companies. In the Lockdown blog, we often talk about the tools and processes customers use to prepare for both internal and external information security audits. This time we thought we’d turn the tables and speak directly to an auditor to hear his perspective. In this post, auditor…