+1-202-802-9399 U.S. Headquarters

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘For CISOs’

How mature is Australia really, when it comes to cyber security?

May 16th, 2017

Guest blog post by emt Distribution.  According to The Australian Strategic Policy Institutes’ report on Cyber Maturity in the Asia-Pacific Region (2016), Australia is ranked at 4th place, one up from the weighted scores in 2015. Who’s doing better? The US, South Korea, and Japan, followed by Singapore, then New Zealand. So why are we not ranked


Surprising Takeaways from the 2017 Verizon Data Breach Investigations Report

May 3rd, 2017

2016 was a major year for cyber-crime and disruption, with many major significant data breaches (the presidential elections), the Distributed Denial of Service (DDoS) attacks using a botnet of Internet of Things (IoT), and the biggest data disclosure to date, twice, with Yahoo. This is now the 10th version of the Verizon Data Breach Investigations Report


Top takeaways from Symantec’s Internet Security Threat Report 2017

April 27th, 2017

The latest release of the Symantec Internet Security Threat Report summarizes the state of cyber threats across the world.  “Symantec maintains one of the world’s most comprehensive vulnerability databases, currently consisting of more than 88,900 recorded vulnerabilities (spanning more than two decades) from 24,560 vendors representing over 78,900 products.” The report raises several key incidents


Easy read to get your staff and stakeholders up to speed on Privileged Account Management security

April 4th, 2017

We’re constantly fighting an awareness battle in getting IT professionals and business stakeholders to appreciate the urgency associated with securing Privileged Account credentials. With so many high-profile breaches accomplished through the compromise of user passwords and escalation to access privileged accounts, security pros and IT directors are looking for simple ways to educate people throughout


A Cloud-First Strategy

March 14th, 2017

Guest column by Mike Somerville originally posted on Ed TechDigest on February 16, 2017 As Manager of Systems Support and Chief Cloud Evangelist, I lead the IT systems team at the University of San Diego. We’re responsible for four data centers, the network, virtualization, servers, and more—everything that needs a password for access. Automating Privileged


Cyber security Tips for Break Room and Board Room Business Leaders

October 11th, 2016

Everyone’s more familiar with cyber security than ever before as it’s now a frequent headline in the daily news and media. Every day we are updated about the latest cyber security breaches whether it’s Yahoo, Dropbox or LinkedIn, how many records have been stolen, or how much companies have paid in result from ransomware or


Measuring Security Awareness in Your Organization

September 26th, 2016

Information Security’s ability to educate and empower employees in their risk management responsibilities is a fundamental element of any business protection strategy. If employees in your company think IT Security is the owner of all security related business risk, you’re in big trouble. IT Security pros are paid to understand the range and depth of


3 Strategies for Helping CISOs Communicate to The Board of Directors

August 30th, 2016

A CISO’s ability to communicate becomes even more important when trying to get the attention of an executive board. Now that IT security is an essential part of risk management, chief information security officers (CISOs) must effectively present their case to c-level executives in order to articulate risk posture, explain strategy, or get more budget.


Top 10 Questions to Ask Before Planning Your Privileged Account Management Strategy

August 25th, 2016

The shocking findings from the recent groundbreaking report from Thycotic and Cybersecurity Ventures highlights many companies are not doing enough to protect privileged accounts that are crucial to protecting companies from cyber-attacks. In this blog series we are going to look at some of the key findings so stay tuned. A major metric was that


RSA 2016 Cyber Terrorism Survey Results and Thoughts

April 4th, 2016

RSA 2016 was an incredibly busy show for us here at Thycotic. Between releasing a slew of new features for our flagship software Thycotic Secret Server, announcing our acquisition of Arellia, continuing to drive the Privileged Account Management space, and delivering multiple talks on how to solve many of the most common security and IT Operations