Phone Number +1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘Least Privilege & App Control’

An ethical hack reveals endpoint security vulnerabilities

January 5th, 2021

“Know thy enemy and know yourself; in a hundred battles, you will never be defeated.” ~ Sun Tzu, The Art of War Sun Tzu’s advice is as applicable in cyber security as it is in battle. He warns, “When you are ignorant of the enemy but know yourself, your chances of winning or losing are equal. If ignorant…


Hardening Windows Endpoints Against Cyber Attack: Part II

December 30th, 2020

In Part I of the blog series, Hardening Windows Endpoints Against Cyber Attack, I covered the first three steps of an ethical hack. Step 0: Pre-Engagement Step 1: Passive Recon Step 2: Active Recon Now the run really begins. In this blog post, you’ll learn how to put all the knowledge you gained during the…


Least Privilege Examples, as told by the Three Ghosts of “A Christmas Carol”

December 24th, 2020

With the holiday season upon us, it’s a good time to settle down with a beloved story. I re-watched the Charles Dickens classic, A Christmas Carol, the other day (well, actually it was Scrooged with Bill Murray, of course) and found myself thinking about the parallels with cyber security. Really, I did. In the story,…


Hardening Windows Endpoints Against Cyber Attack: Part I

December 22nd, 2020

To secure Windows endpoints against cyber attacks, it helps to think like a cyber criminal. Cyber criminals look for the cheapest, fastest, stealthiest way to achieve their goals. Windows endpoints provide many opportunities to gain entry to IT environments and access to sensitive information. As part of the ethical hacking community, my ultimate goal is…


How to Protect Your macOS Endpoints with Shift from KEXT to SYSEX

December 3rd, 2020

Cue music: Ch-Ch-Cha-Changes In recent macOS releases, Apple has been drawing attention to third-party software that uses technology like kernel extensions and system extensions. This technology allows users to install components or apps that extend the native capabilities of the macOS operating system. Apple’s deprecation of kernel extensions (KEXTs) and introduction of Endpoint Security Enabled…


Every system is a privileged system: Incorporating Unix/Linux in your privilege management strategy

November 24th, 2020

Lately we’ve been banging the drum that “every user is a privileged user,” meaning privileged users aren’t limited to system administrators but also include business users with access to applications and endpoints linked to critical business data and functions. The second verse to that refrain is that “every system is a privileged system.” Within your IT environment,…


Shadow IT Security Risks: Web applications off your radar make privileged access management even more complicated

September 29th, 2020

A quiet proliferation of web applications and infrastructure with web-based interfaces is taking place throughout your organization. Known as “Shadow IT,” many web applications and platforms are often licensed by business, financial, and technical users, independent of central IT management. Sometimes these groups even build their own technology solutions. Security and operations folks who are tasked…


Role-Based Access Control for a Complex Enterprise

September 1st, 2020

What is role-based access control (RBAC)? Role-based access control, or RBAC, is the antidote to piecemeal user and permission management. RBAC provides a mechanism for system administrators to set policies and apply them as appropriate. A core tenet of RBAC is to preemptively set rules which apply to all users, rather than making on-the-fly decisions…


Privilege Manager 10.8: Simplifying endpoint privilege management through usable security

August 25th, 2020

A powerful new interface and additional enhancements make Privilege Manager 10.8 an important release to ensure usable security. Privilege Manager is the most comprehensive endpoint privilege elevation and application control solution, capable of supporting enterprises and fast-growing organizations at cloud scale. Over the past year, our product teams and UX and human-computer interaction team have…


The Twitter Hack and the Failure to Protect Privileged Access

July 17th, 2020

Twitter. The biggest social media hack so far, and it could have been much, much worse! We all should be very worried. Could a tweet start a war, change the outcome of an election, cause a riot, or even get people to send money (bitcoin) to unverified BTC wallets? On Wednesday 15 July, we experienced…