Contact Us +1-202-802-9399 U.S. Headquarters
Free Trial

Posts Tagged ‘IT security’

Challenges Faced By CISOs: Balancing Security versus Manpower

Wednesday, January 27th, 2016

Guest blog post by Ashiq JA from the InfoSec Institute.  Cybersecurity is not just about buying the latest security monitoring and automation tools to solve the day-to-day problems. Government and banking organizations have increased funding for managing security vulnerabilities and risks. Security tools that are available in the market may identify and solve only part […]

Forward-facing security by remembering the past

Thursday, January 7th, 2016

As the new year begins, it’s a good time to look forward to what’s on the horizon and reflect on the successes and struggles of the past 12 months. Given the speed with which technologies emerge, these moments give us perspective when planning to make the coming year a stronger and more successful one. When […]

10 Must-Follow InfoSec Bloggers of 2015

Thursday, November 12th, 2015

Want to stay up to date on the latest information security trends, breaches, and discoveries? We searched across the deep web to find the top bloggers who live and breathe information security. It’s these amazing security experts who make your life easier by keeping you up to date on the latest InfoSec news and research. […]

Thycotic Welcomes James Legg as President and COO

Tuesday, August 11th, 2015

This has been quite an exciting summer for Thycotic! After announcing our investment backing from Insight Venture Partners, we have more exciting news in store for customers, partners, and alliances. This week, the Thycotic team received a +1 in the form of 25 year technology executive and sales professional James Legg. Known as “Jim” to […]

PAM Security Blog Series Part 3: How to secure your privileged credentials

Tuesday, July 21st, 2015

In this video blog series, IT security experts explain why compromised privileged credentials are at the heart of most large-scale cyber-attacks, and how privileged account management can help IT teams mitigate a host of security and compliance issues. You’ve heard from the experts why privileged credentials are at the heart of most large-scale cyber-attacks, read […]

PAM Security Video Series Part 2: Why Privileged Credentials Are At The Heart of Most Large-Scale Cyber Attacks

Tuesday, July 7th, 2015

In this video blog series, IT security experts explain why compromised privileged credentials are at the heart of most large-scale cyber-attacks, and how privileged account management can help IT teams mitigate a host of security and compliance issues. In our first video post for this series we debunked the common myth that passwords are dead. […]

Large Organization Employee Threat Assessment

Tuesday, February 17th, 2015

Despite the popular image of the hacker cracking distant servers from his basement, studies show that people with legitimate access to your information pose an even bigger threat. And when information is stolen from within, it’s often harder to trace and determine the extent of the problem. The larger your organization, the more is the […]

2015: When Things Get Serious

Tuesday, February 3rd, 2015

Let’s start looking at the future of the IT Security landscape by reviewing the past. I made some predictions last year for InfoSec Institute. The article started off with a clever disclaimer that all subjects in the IT Security world are new and are still pioneering in their fields, so that anything can happen within […]

[VIDEO] What You Need to Know About Bash Bug

Tuesday, October 7th, 2014

We’ve all heard the headlines of the most recent security bug, including, ‘Shellshock bug could threaten millions compared to Heartbleed,’ or even more terrifying, ‘Shellshock: A deadly new vulnerability that could lay waste to the internet.’ While these headlines are a bit dramatic, there lies some truth in the statements. The National Institute for Standards […]

Infamous Heartbleed Bug Responsible for Over 4.5 Million Patient Records Leaked

Tuesday, September 9th, 2014

Heartbleed continues to haunt the organizations as patch efforts remain ignored. In April we notified our customers that our solutions remained unaffected, but unfortunately for millions that was not the case. Over six months later a data breach at Community Health Systems is the result of the infamous Heartbleed vulnerability that several versions of OpenSSL […]

Secret Server is the enterprise password management software that IT Admins and Security Pros love!

Try it FREE for 30 Days