+1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘Managing Privileged Accounts’

Six Key Differences Between Password Management Tools and PAM

September 4th, 2018

In the past, Privilege Access Management (PAM) was accessible only to large enterprises with skilled IT teams. Feature-heavy PAM tools became more and more complex and expensive to manage. Meanwhile, security-conscious small and medium businesses were relegated to using password tools designed primarily for consumers. While consumer password tools provide a “password vault” to store…


Incident Response: Are You Breach-Ready?

August 28th, 2018

It’s no longer rare to see cyber-attacks in the daily news. From ransomware to data breaches to DDoS (Distributed Denial of Service) attacks, the incident is usually attributed to either cyber criminals or nation states, and almost always comes from beyond our own country’s borders and laws. Because of this, we worry about clicking on…


Back to the Basics: How do you define Privileged Access?

August 7th, 2018

The Privileged Access Management Lifecycle and Path to Maturity Countless organizations are growing more and more concerned about the ever-evolving threat landscape of cyber-attacks, as they watch large well-known enterprise organizations falling victim to cyber-crime. Every year billions of records are stolen, identity theft increases, more credentials are abused and financial fraud is now extending…


Gartner: Privileged Access Management is the #1 Cyber Security Priority for 2018

June 11th, 2018

A recent report from Gartner reveals the top IT Security Projects for 2018 with Privileged Access Management as #1, Application Control #4 and Protecting Endpoints #6. Before we get into why Privileged Access Management (PAM) is the #1 Cyber Security Priority in 2018, let’s take a quick look at what lead up to this change…


Infosecurity Europe kicks off in London on June 5. Here’s how you’ll get the most out of it

June 5th, 2018

It’s the beginning of June and that means one thing in the cyber security professional’s calendar: Infosecurity Europe is here. Infosecurity Europe  is one of the largest cyber security events in Europe with over 400 exhibitors gathering to show off the latest in cyber security defense (and also some offensive capabilities) to about 20,000 cyber…


2018 Global State of Privileged Access Management Risk and Compliance: Part 1

April 26th, 2018

Most companies are FALLING SHORT on compliance when it comes to privileged accounts! Thycotic’s research shows Privileged Access Management is a Top Risk and Compliance requirement, yet it’s significantly failing to be fully implemented meaning that most companies fall short on compliance for privileged access. The majority of organizations begin to implement Privileged Access Management…


Cyber Security Responsibilities: Who owns your organization’s PAM Policy Template?

January 16th, 2018

Who is responsible for creating, implementing and overseeing your organization’s Privileged Account Management Policy template? And what is at risk if no individuals or departments are named to ensure that your users and systems are in compliance with your PAM Policy? Let’s get the easy part out of the way: if your organization has its…


The #1 priority for improving cybersecurity? Implementing a Privileged Account Management Cycle approach!

January 5th, 2018

In a white paper released in October 2017 by analyst firm KuppingCole, Martin Kuppinger makes the case for why companies need to pay more attention to privileged account protection at all levels. Entitled, “Protecting the keys to your kingdom against cyber-attacks and insider threats,” he points out that Privileged Account Management is far more than…


MSPs at Risk: You are at serious risk if you are not properly managing your clients’ credentials

December 20th, 2017

I ask MSPs: How secure are the clients’ passwords you manage today? As an MSP you must meet special security needs because you hold critical privileged passwords, not only your own organization, but for your clients’ as well. Do you have an accurate answer for these questions, or are there some unknowns in your organization?…


PAM Risk Assessment: your first step to better privileged access control

December 12th, 2017

These days Privileged Access Management and Privileged Account Management (PAM) are interchangeable terms that get a lot of attention. There’s a reason why PAM is fast becoming a top-of-mind cybersecurity issue:  up to 80% of cybersecurity breaches are associated with the abuse or misuse of privileged account credentials. And these credentials readily give hackers or…