Phone Number +1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘Least Privilege & App Control’

Privilege Manager Offers Increased Flexibility and Enterprise-Wide Security

September 21st, 2021

No enterprise is alike in the way they organize privileged users or choose to connect IT systems.  The latest release of Privilege Manager provides greater flexibility and choice by supporting diverse models for computer management and identity federation. For organizations that manage a variety of privileged users, business units, and connected technologies, Privilege Manager now…


Zero Trust Privilege for PAM Dummies eBook

August 10th, 2021

Security is Broken. Long Live Security. At ThycoticCentrify, cyber security is our bag. We’ve blogged about how identity-based breaches are on the rise, fueled by a perfect storm of conditions that include cloud transformation, an expanding attack surface, and wholesale remote VPN-based access due to the increase in work from home. Businesses worldwide are deploying…


Privilege Elevation for Workstations and Servers

July 13th, 2021

“Start with the end in mind.” That’s how people tell you to face a challenge. While that’s true, the end can sometimes look so far away you feel overwhelmed before you even begin. When that happens, the best thing to do is set small, attainable goals along the way. You can use the same strategy…


Layered Privilege Security with Secret Server and Privilege Manager

June 22nd, 2021

Nearly all major data breaches involve both compromised endpoints and compromised privileged credentials. You must address both of these attack vectors in a layered security strategy to effectively lower your risk of a cyber attack. Layered security combines different security solutions into a coordinated, comprehensive strategy, the whole of which is greater than the sum…


Securing and Hardening Linux and Unix Endpoints Against Cyber Attack: Part IV

March 30th, 2021

This post is part of a series on securing your endpoints against cyber attacks. Read: Part I | Part II | Part III | Part IV How Secure are your Linux Endpoints? An Ethical Hacker’s Guide to Securing and Hardening Linux and Unix Endpoints Welcome to the next post in our series on hardening and…


Securing and Hardening Linux and Unix Endpoints Against Cyber Attack: Part III

March 23rd, 2021

This post is part of a series on securing your endpoints against cyber attacks. Read: Part I | Part II | Part III | Part IV How Secure are your Linux Endpoints? An Ethical Hacker’s Guide to Securing and Hardening Linux and Unix Endpoints Welcome to the next post in our series on hardening and…


Privilege Manager 11: New Privilege Management Capabilities for Unix and Linux

March 2nd, 2021

With the latest release of Privilege Manager, all endpoints and servers throughout your organization can now follow consistent least privilege and Zero Trust policies, whether they are Windows, Mac, or Unix/Linux. Until now, privilege security for Unix/Linux has been cumbersome and even risky.  Unix/Linux has become the go-to operating system for many types of computer…


Defense-in-depth with Overlapping Rings of Endpoint Security

February 16th, 2021

Defense-in-depth with overlapping rings of endpoint security When a cyber criminal wants to break into your network, the number one way they succeed is by attacking endpoints. Cyber criminals break into one endpoint and then use the passwords found there, and the privileges they provide, to move laterally from the endpoint onto your network. Endpoint…


Enterprise Endpoint Management is a Must When All Users are Privileged Users

January 26th, 2021

A newly released eBook, The Definitive Guide to Endpoint Privilege Management (EPM), makes a strong case for why vulnerable endpoints must be secured from the perspective that all users are privileged users. In the guide’s Foreword, I emphasize that user identity has become the new “perimeter” of cyber security. That’s because a single compromised credential…


An Ethical Hack Reveals Endpoint Security Vulnerabilities

January 5th, 2021

“Know thy enemy and know yourself; in a hundred battles, you will never be defeated.” ~ Sun Tzu, The Art of War Sun Tzu’s advice is as applicable in cyber security as it is in battle. He warns, “When you are ignorant of the enemy but know yourself, your chances of winning or losing are equal. If ignorant…