Phone Number +1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘PAM Basics’

Insurance Leader Rolls Out Enterprise PAM Strategy

June 11th, 2020

One of my favorite parts of this job is speaking with our customers to understand why they chose our solutions, and how they are using them to solve their challenges. Recently, I spoke with one of our customers who described Secret Server as his “favorite security tool!” So, I thought I would share his story.  Insurance Leader…


10 Features Every Privileged Access Management Solution Must Have

May 26th, 2020

The MoSCoW method is a prioritization technique used in project management and software to prioritize requirements. It stands for: Must have, Should have, Could have, and Won't have. Using this approach can help you build a common understanding among your stakeholders as you evaluate and select a privileged access management (PAM) solution. In this blog, we’ll focus on the 10…


How Do Passwords Work?

May 7th, 2020

If you want to make a purchase, post a comment in a forum, or even read content on many websites, you’re prompted to create (and remember!) a password. What’s going on when you create a password? And how does this process help keep your information safe? When you create a password on a website, that…


The Landscape of PAM is Changing – Customers Want Mobile PAM

May 5th, 2020

At Thycotic, we’re watching the landscape of our customers’ privileged access management needs evolve. PAM can no longer be simply a web application hosted on premise; our customers are telling us they need flexible deployment and access options. More day-to-day business operations need access to data, applications, and platforms Organizations are also acknowledging that PAM…


ServiceNow Integration Removes Bottlenecks for Service Account Governance

April 21st, 2020

Many IT operations teams are working hard to move beyond a reactive, service-desk approach. They are taking on broader responsibilities for proactive management and measuring the business impact of their efforts for employees and customers. For a comprehensive view of IT-related projects, many organizations rely on IT service management systems (ITSM) that account for all…


Cyber-Criminals are Targeting Your Service Accounts, and Regulators are Taking Notice

February 25th, 2020

For the past few months we've been highlighting the critical nature of service accounts  and the importance of governing service accounts appropriately.  Recently, a customer came to us following a Sarbanes-Oxley (Sox) audit they failed largely due to mismanaged service accounts. It’s a story we’re hearing more and more frequently. Regulators are finally catching on…


How to protect service accounts without losing your mind: Automated tools!

January 14th, 2020

Here at Thycotic, we are always banging the drum on the importance of securing privileged access. Early in 2019, we got a glimpse of what can happen if you don’t when more than 100 million credit applications at Capital One were stolen by an individual in a security breach that involved a web service and…


Could basic password security practices have helped prevent the latest Equifax lawsuit?

November 7th, 2019

Fallout from the 2017 Equifax data breach is back in the news as a new class-action suit consolidated 373 previous lawsuits into one. Unlike previous lawsuits filed by Equifax customers, the latest action comes from shareholders that allege the company didn’t adequately follow or disclose security practices, including poor password management. If you google, “what…


Privileged Access Management Best Practices

September 24th, 2019

For the past two years, Gartner has named privileged access management (PAM) the top IT security priority. Privileged account credentials for domain admins, service, application, and root accounts are valuable targets. When attackers gain these credentials, they can exploit your most sensitive information and critical systems. Privileged access gives them power to alter data, change…


Before the Breach: Leveraging PAM and VPAM solutions to protect privileged credentials

August 27th, 2019

This is a guest blog written by Tony Howlett, CISO at SecureLink. Tony is a published author and speaker on various security, compliance, and technology topics. He also serves as President of (ISC)2 Austin Chapter and is an Advisory Board Member of GIAC/SANS. CISOs and their security teams have an impossible task; they must predict…