+1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘Least Privilege & App Control’

Behind the Scenes: Endpoint Protection in the Cloud

April 16th, 2019

The cloud has certainly been a game changer, driving innovation and growth.  Companies that adopted cloud services experienced a 20.7% average improvement in time to market, 18.8% average increase in process efficiency and a 15% reduction in IT spending. Together, these benefits led to a 19.6% increase in company growth. These savings and benefits, among…


How to kick start your least privilege strategy as we begin 2019

January 15th, 2019

As we open 2019, we are expecting the issue of least privilege cybersecurity to become a priority for companies across the spectrum. One of the big reasons, of course, is that 80 percent of breaches today involve the compromise of IT and business user credentials including usernames and passwords.  To combat the exploitation of compromised…


Lower Risk of PowerShell Vulnerabilities with Privilege Management

November 28th, 2018

PowerShell and other scripting tools are part of an IT professional’s arsenal. They are incredibly powerful, a force multiplier which allows you to automate important or frequently used tasks. The same traits that make these tools a boon for IT pros also make them valuable to malicious actors who can use them to exponentially increase their…


Together Thycotic & IBM Deliver Next-Generation Privileged Access Management

November 27th, 2018

Did you hear the news? We’ve entered into an original equipment manufacturing (OEM) agreement with IBM Security! This partnership comes with an increased need for organizations to secure privileged accounts that are connected to just about every device on the network. Breaches through privileged accounts are on the rise. Now more than ever, organizations need…


What is Least Privilege? Why you need it and how to get started

November 20th, 2018

Least privilege calls for granting only the minimum permissions required by an end-user, application, service, task or system to perform the jobs they have been assigned. Least privilege is intended to prevent “over-privileged access” by users, applications, or services to help reduce the risk of exploitation without impacting productivity or involving the IT help desk.…


5 Spooky Privilege Security Mistakes that Will Haunt Your Organization

October 30th, 2018

It’s a dark and stormy night. Suddenly your system locks up. Then you get a message, demanding online payment to release your sensitive data back to you. Unfortunately, this isn’t a Halloween prank. Ransomware is on the rise and organizations of all types are falling victim. Your risk of cyber-attack exponentially increases if you’ve made…


Get Complete Application Control Management with CylancePROTECT and Privilege Manager

October 19th, 2018

Thycotic customers are constantly requesting integrations with other products in their arsenal, especially other security products. Thycotic’s product team for Privilege Manager—our least privilege and application control product—is asked to work with CylancePROTECT® day after day. Our common customers are using both Thycotic and Cylance products on the endpoint to provide multiple layers of malware protection.…


Seven Signs It’s Time to Move On from GPO-Only Privilege Management

September 11th, 2018

Many organizations gravitate towards Group Policy Objects (GPO) for privilege management because it offers enough functionality to get started managing privileges. Yet, as your needs evolve, you may find that you require a privilege management system better suited to a maturing, sophisticated organization. What are some of the warning signs that you need more than…


Cyber criminals don’t want to be found—a Privilege Detective using Thycotic’s free Least Privilege Discovery Tool

July 10th, 2018

Cyber criminals don’t want to be found. They play a great game of hide and seek, and in many companies—no one is doing any seeking. Instead, they hope that their security perimeter is holding strong, typically relying on traditional cyber security controls that are usually outdated and, for most cyber criminals, easily bypassed using phishing…


Everything you need to know about NIST 800-53

June 19th, 2018

The National Institute of Standards and Technology (simply referred to as NIST) sets the security standards, guidelines and recommended security controls for the Federal Information Systems and Organizations.  This extensive database of publications includes the FIPS (Federal Information Processing Standards), SP (NIST Special Publications), NISTIR (NIST Internal Reports) and the ITL Bulletin (NIST Information Technology…