Phone Number +1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘For CISOs’

How do you make cyber security tech buying decisions? Here’s what your peers say.

October 13th, 2020

Commissioned by Thycotic, a research survey was conducted among more than 900 CISOs/Senior IT decision-makers across nine countries in August 2020. The report of survey results takes a close look at how IT and security professionals make technology buying decisions, and what most influences Boards to invest in cybersecurity. The new report, entitled, Cyber Security…


What does world-class Identity Governance look like?

September 10th, 2020

Identity governance is a critical foundational practice required to secure and manage privilege and access across the enterprise. Organizations are required to demonstrate an enterprise identity governance program that complies with nearly every significant compliance audit for almost every industry. Identity governance programs are typically deployed as part of the security stack that includes Identity…


Rising to the Modern PAM Challenge

September 8th, 2020

What drives change in the security space? Either a significant shift in the business environment disrupts how people work, or technology advancements impact the attack surface. Today, security teams are facing both challenges. Remote work is here to stay. No company that I've talked with has plans to bring the full workforce back to the…


Thycotic named a Leader in the 2020 Gartner Magic Quadrant for Privileged Access Management

August 19th, 2020

Thycotic is proud to announce that we have been named a Leader in the Gartner 2020 Magic Quadrant for Privileged Access Management (PAM).  Based on our ability to execute and completeness of vision, Thycotic has been positioned as a Leader in the new Gartner 2020 Magic Quadrant for PAM. This marks a major milestone in our growth…


Industrial IoT, Security, and Privileged Access Management

August 4th, 2020

The convergence of operational technology (OT) and information technology (IT) has propelled “Industry 4.0” into the spotlight as the next wave of the industrial revolution. The Industrial Internet of Things (IIoT) brings IT and OT together in industries such as manufacturing, logistics, smart buildings, utilities, and critical infrastructure. Companies that get IIoT right will have…


PAM cloud security is different. Let me explain why

July 28th, 2020

The 2020 Verizon Data Breach and Incident Report (DBIR) published in May gives a clear indication of where privileged access management (PAM) security is going these days. And the forecast is for cloudy skies ahead.  That’s because: 77% of cloud breaches are due to compromised credentials Attacks on web applications more than doubled in 2019…


EU GDPR two years in: What’s happened so far, and what’s in store for the future?

July 21st, 2020

On May 25th, 2020 EU GDPR was 2 years old and it passed with little noise.  I guess that everyone’s been distracted by other events such as the COVID-19 Pandemic which has put the world on pause for the time being, and that includes EU GDPR. EU GDPR has raised the bar for digital rights,…


5 Top Takeaways from the Verizon Data Breach Investigations Report 2020

June 17th, 2020

The latest Verizon Data Breach Investigations Report 2020 is now publicly available to download or read online. As one of the industry’s top cyber security reports, the 13th Edition of the Verizon Data Breach Investigations Report (DBIR) is one of our leading indicators of what causes security incidents and why data breaches occur.  With researchers…


Insurance Leader Rolls Out Enterprise PAM Strategy

June 11th, 2020

One of my favorite parts of this job is speaking with our customers to understand why they chose our solutions, and how they are using them to solve their challenges. Recently, I spoke with one of our customers who described Secret Server as his “favorite security tool!” So, I thought I would share his story.  Insurance Leader…


A New Approach to Modern Enterprise Access Management (formerly Onion ID)

June 4th, 2020

Earlier this week, we publicly announced the acquisition of Onion ID—a San Francisco-based identity and privileged access management (PAM) company. The acquisition marks a significant milestone in Thycotic’s strategic direction as a PAM company. Over the past several years, we have driven innovation through a multi-stage product roadmap designed to help companies adopt PAM and…