+1-202-802-9399 U.S. Headquarters

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘For CISOs’

Black Hat Hacker Insights: The easiest way hackers access your sensitive data

August 17th, 2017

Hackers claim that compromised privileged accounts are their quickest route to your sensitive data. We asked nearly 300 hackers “What is the fastest route to getting access to an organization’s sensitive data? The response was that it’s a toss-up between privileged accounts and compromised email accounts, both of which can hold a trove of sensitive…


Top 5 privileged account security reports CISOs must have: Who hasn’t logged in within the last 90 days?

August 16th, 2017

When you know exactly who has not used your privileged account management tool in a while you can eliminate potentially risky users who no longer need access to the tool and the privileged accounts that it protects. In this exclusive 5-part Thycotic educational series we outline the privileged account security reports CISOs must have to…


Black Hat Hacker Insights: What’s creating new opportunities for hackers?

August 15th, 2017

Fast-growing technologies are blurring the boundaries of the traditional perimeter and creating new opportunities for hackers. The traditional security perimeter protecting most organizations is proving to be an ineffective cyber security control today. Fast-growing technologies like Cloud, Mobile and Virtualization have made the boundaries of the organization blurry, and this has not gone unnoticed by…


Black Hat 2017 Survey: Hackers disclose your cyber security vulnerabilities

August 9th, 2017

With the start of Black Hat USA 2017, the annual conference turned 20, and more than fifteen thousand executives, security professionals and experts from all around the world arrived in Las Vegas to share experiences and ideas on one of the most formidable security issues facing the world today: cyber security.   It was a…


Top 5 privileged account security reports CISOs must have: Which privileged accounts are no longer valid?

August 1st, 2017

When you do not know which of your sensitive stored credentials are incorrect and no longer working normally, you run the risk that they will be changed outside the scope of your corporate policy by an administrator or by a malicious attacker who has breached your system. In this exclusive 5-part Thycotic educational series we…


Top 5 privileged account security reports CISOs must have: What computers in Active Directory no longer exist?

July 24th, 2017

When you know which computers in Active Directory no longer exist or have been decommissioned, you can quickly take action to protect your organization from the multitude of risks presented by unknown or unmanaged systems and accounts. Hackers target your privileged account credentials for good reason. Once they gain access, they can escalate their privileges…


5 Security Policies every CISO Must Enforce Now

July 20th, 2017

Chief Information Security Officers, CISOs, bear some of the heftiest weights on their shoulders of anyone in an organization. Single-handedly, depending on their security policies and the enforcement of them, they can be responsible for the success or downfall of an entire company. It is, literally, a thankless position because usually nobody says a word…


The Tide is Turning for Privileged Account Management and Security

July 14th, 2017

CyberArk’s latest preliminary earning report and investor reactions show they’re starting to lose sight on what the market is looking for. For years CyberArk has been the biggest and, in many cases, the only player in the Privileged Account Management space.  When you’re one of the first to market, it gives you a lot of…


How mature is Australia really, when it comes to cyber security?

May 16th, 2017

Guest blog post by emt Distribution.  According to The Australian Strategic Policy Institutes’ report on Cyber Maturity in the Asia-Pacific Region (2016), Australia is ranked at 4th place, one up from the weighted scores in 2015. Who’s doing better? The US, South Korea, and Japan, followed by Singapore, then New Zealand. So why are we not ranked…


Surprising Takeaways from the 2017 Verizon Data Breach Investigations Report

May 3rd, 2017

2016 was a major year for cyber-crime and disruption, with many major significant data breaches (the presidential elections), the Distributed Denial of Service (DDoS) attacks using a botnet of Internet of Things (IoT), and the biggest data disclosure to date, twice, with Yahoo. This is now the 10th version of the Verizon Data Breach Investigations Report…