+1-202-802-9399 U.S. Headquarters

Thycotic’s CyberSecurity Publication


Filter by Tags: 

Posts Tagged ‘IAM’

Need an IAM Solution? Make Sure It Has the Right Foundation

April 19th, 2017

Guest column by SailPoint, the leader in enterprise identity management, brings the Power of Identity to customers around the world. As both an industry pioneer and market leader in identity governance, SailPoint delivers security, operational efficiency and compliance to enterprises with complex IT environments. In today’s highly distributed IT world, where organizations must secure a […]

Top Tips: Extend Identity and Access Management to Protect All Privileged Accounts

April 18th, 2017

The traditional security perimeter is proving no longer an effective cyber security control and fast growing technologies like cloud, mobile and virtualization make the boundaries of an organization blurry. For many years, organizations have protected their valuable and sensitive information by building a fence around those assets. All the data following in and out of […]

Why do employees choose to become insider threats?

June 9th, 2015

A company went out of business. A person was marked as deceased in a large government database. A company’s domain name was added to anti-spam blacklists. All of these are outcomes of insider threat cases documented in The CERT Guide to Insider Threats, and could easily happen to any business today that does not have the […]

Access Control: Models and Methods

November 4th, 2014

By: Stuart Gentry, an InfoSec Institute contributor and computer security enthusiast/researcher. There are times when people need access to information, such as documents, slides, etc., on a network drive but don’t have the appropriate level of access to read and/or modify the item. This can happen at the most inconvenient time and they would need […]