+1-202-802-9399 U.S. Headquarters

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘IAM’

Security: Powered by People

June 8th, 2017

Guest column by SailPoint. Author: Juliette Rizkallah The acceleration of cloud adoption is gaining more traction each day. If we’ve said it once, we’ve said it a thousand times, cloud is where the majority of enterprises are headed. It’s more than just your employees who are using the cloud to get things done; the cloud connects…


Cybersecurity Awareness: Empowering Our People

May 5th, 2017

Guest column by SailPoint, the leader in enterprise identity management, brings the Power of Identity to customers around the world. As both an industry pioneer and market leader in identity governance, SailPoint delivers security, operational efficiency and compliance to enterprises with complex IT environments. Author: Darren Rolls Like it or not, when it comes to…


Need an IAM Solution? Make Sure It Has the Right Foundation

April 19th, 2017

Guest column by SailPoint, the leader in enterprise identity management, brings the Power of Identity to customers around the world. As both an industry pioneer and market leader in identity governance, SailPoint delivers security, operational efficiency and compliance to enterprises with complex IT environments. In today’s highly distributed IT world, where organizations must secure a…


Top Tips: Extend Identity and Access Management to Protect All Privileged Accounts

April 18th, 2017

The traditional security perimeter is proving no longer an effective cyber security control and fast growing technologies like cloud, mobile and virtualization make the boundaries of an organization blurry. For many years, organizations have protected their valuable and sensitive information by building a fence around those assets. All the data following in and out of…


Why do employees choose to become insider threats?

June 9th, 2015

A company went out of business. A person was marked as deceased in a large government database. A company’s domain name was added to anti-spam blacklists. All of these are outcomes of insider threat cases documented in The CERT Guide to Insider Threats, and could easily happen to any business today that does not have the…


Access Control: Models and Methods

November 4th, 2014

By: Stuart Gentry, an InfoSec Institute contributor and computer security enthusiast/researcher. There are times when people need access to information, such as documents, slides, etc., on a network drive but don’t have the appropriate level of access to read and/or modify the item. This can happen at the most inconvenient time and they would need…