+1-202-802-9399 U.S. Headquarters
Free Trial

Posts Tagged ‘IT security’

CYBER SMART: When was the Payment Card Industry Security Standards Council formed?

Friday, April 1st, 2016

Question of the Week: When was the Payment Card Industry Security Standards Council formed? Answer: December 15, 2004 The Payment Card Industry Security Standards Council first formed on December 15th, 2004 as five different programs with the same goal in mind, “To create an additional level of protection for card issuers by ensuring that merchants […]

Privileged Passwords. The easiest way into your business?

Tuesday, March 29th, 2016

  We’ve had great success in EMEA teaming with the top partners to deliver the industry’s most comprehensive privileged account management solution. Here’s an example of what our distributor in the UK, Alpha Generation, recently posted about how easily it is for attackers to gain privileged access and take over the network.   Attackers don’t break-in when they […]

CYBER SMART: What is the most in-demand IT security certification?

Friday, March 25th, 2016

Question of the Week: What is the most in-demand IT security certification? Answer: ISSEP/CISSP The ISSEP/CISSP IT security certification had a market value percent change of 36.4 percent in Q1 2015 over the previous quarter making it the most in demand certification! The certification was developed along with  the U.S. National Security Agency (NSA). Looking for […]

IT Weapons Customer Spotlight: Reducing Cyber Risk for Global Client Base

Tuesday, March 1st, 2016

  For the last 15 years, IT Weapons, a Konica-Minolta Company, has provided award-winning security consulting, private cloud solutions, and technology services for organizations worldwide. They had been using homegrown privileged account management (PAM) solutions, but grew quickly and determined that they needed an enterprise-class PAM solution to improve security and make going through audits […]

Challenges Faced By CISOs: Balancing Security versus Manpower

Wednesday, January 27th, 2016

Guest blog post by Ashiq JA from the InfoSec Institute.  Cybersecurity is not just about buying the latest security monitoring and automation tools to solve the day-to-day problems. Government and banking organizations have increased funding for managing security vulnerabilities and risks. Security tools that are available in the market may identify and solve only part […]

Forward-facing security by remembering the past

Thursday, January 7th, 2016

As the new year begins, it’s a good time to look forward to what’s on the horizon and reflect on the successes and struggles of the past 12 months. Given the speed with which technologies emerge, these moments give us perspective when planning to make the coming year a stronger and more successful one. When […]

10 Must-Follow InfoSec Bloggers of 2015

Thursday, November 12th, 2015

Want to stay up to date on the latest information security trends, breaches, and discoveries? We searched across the deep web to find the top bloggers who live and breathe information security. It’s these amazing security experts who make your life easier by keeping you up to date on the latest InfoSec news and research. […]

Thycotic Welcomes James Legg as President and COO

Tuesday, August 11th, 2015

This has been quite an exciting summer for Thycotic! After announcing our investment backing from Insight Venture Partners, we have more exciting news in store for customers, partners, and alliances. This week, the Thycotic team received a +1 in the form of 25 year technology executive and sales professional James Legg. Known as “Jim” to […]

PAM Security Blog Series Part 3: How to secure your privileged credentials

Tuesday, July 21st, 2015

In this video blog series, IT security experts explain why compromised privileged credentials are at the heart of most large-scale cyber-attacks, and how privileged account management can help IT teams mitigate a host of security and compliance issues. You’ve heard from the experts why privileged credentials are at the heart of most large-scale cyber-attacks, read […]

PAM Security Video Series Part 2: Why Privileged Credentials Are At The Heart of Most Large-Scale Cyber Attacks

Tuesday, July 7th, 2015

In this video blog series, IT security experts explain why compromised privileged credentials are at the heart of most large-scale cyber-attacks, and how privileged account management can help IT teams mitigate a host of security and compliance issues. In our first video post for this series we debunked the common myth that passwords are dead. […]