Phone Number +1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘PAM Advanced’

Enterprise Trends That Will Define PAM Success in 2021

February 9th, 2021

The landscape of privileged accounts is becoming increasingly complex as organizations add new applications and change working styles in an ongoing COVID-19 world. Meanwhile, cyber criminals are only getting smarter. If you wait too long to plug your security gaps there’s a good chance they’ll find a way to exploit them. Forrester’s most recent Privileged…


Human Error and Implications in Information Security

February 2nd, 2021

Technologists, engineers, and future-focused organizations tout automation as the answer to consistency, reliability, and quality. Automation takes basic tasks out of human hands, freeing up human resources to focus on research, strategy, and planning. Even more, automated systems and services can work tirelessly around the clock. ITOps, DevOps, and SecOps leaders and architects are incredibly…


Thycotic Named a 2021 Gartner Peer Insights Customers’ Choice for Privileged Access Management for Large Enterprise, Finance, and North America

January 21st, 2021

The Thycotic team is excited to announce that we have been recognized as a Customers’ Choice in the January 2021 Gartner Peer Insights ‘Voice of the Customer’: Privileged Access Management Markets Large Enterprise, Finance, and North America. Our team at Thycotic takes great pride in this distinction, as customer feedback continues to shape our products…


An Ethical Hack Reveals Endpoint Security Vulnerabilities

January 5th, 2021

“Know thy enemy and know yourself; in a hundred battles, you will never be defeated.” ~ Sun Tzu, The Art of War Sun Tzu’s advice is as applicable in cyber security as it is in battle. He warns, “When you are ignorant of the enemy but know yourself, your chances of winning or losing are equal. If ignorant…


Hardening Windows Endpoints Against Cyber Attack: Part II

December 30th, 2020

This post is part of a series on securing your endpoints against cyber attacks. Read: Part I | Part II | Part III | Part IV In Part I of the blog series, Hardening Windows Endpoints Against Cyber Attack, I covered the first three steps of an ethical hack: Step 0: Pre-Engagement Step 1: Passive…


Hardening Your Endpoints Against Cyber Attack: Part I

December 22nd, 2020

This post is part of a series on securing your endpoints against cyber attacks. Read: Part I | Part II | Part III | Part IV To secure Windows endpoints against cyber attacks, it helps to think like a cyber criminal. Cyber criminals look for the cheapest, fastest, stealthiest way to achieve their goals. Windows…


The paradigm of effective database security is drastically changing

December 8th, 2020

The transition to cloud computing revolutionizes information technology and the delivery, management, and securing of data. Organizations are rapidly adopting cloud computing, but the evolution is ongoing, with many organizations keeping their mission-critical applications on site. There is one common concern in all organizations: security While migration to the cloud may be a cost-effective option,…


Checklist: 9 Cloud Security Best Practices Your Organization Should Follow

December 1st, 2020

Transitioning to the cloud is one of the most significant technology shifts your company will face. Last year, over 80% of organizations operating in the cloud experienced at least one compromised account each month, stemming from external actors, malicious insiders, or unintentional mistakes. The specifics of cloud security activities may vary depending on your cloud…


How Recent Analyst Research can Help You Find the Right PAM Vendor

November 19th, 2020

According to recent technology buying decision research sponsored by Thycotic, a significant number of executives, IT security and operations teams look primarily to the advice of independent analysts when evaluating a PAM or PIM solution that would work best for their organizations. That means independent analysis becomes very important in identifying vendors that belong on your…


How to Expedite Discovery of Service Accounts for Onboarding into Service Account Governance

November 17th, 2020

Service accounts, by their nature, can take on a life of their own. They’re rarely tied to a human owner if managed at all, so service account sprawl takes over and organizations’ privileged account attack surfaces can expand almost beyond measure. And with almost all medium to large organizations unable to pull service accounts into…