Phone Number +1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘PAM Basics’

Privilege Elevation for Workstations and Servers

July 13th, 2021

“Start with the end in mind.” That’s how people tell you to face a challenge. While that’s true, the end can sometimes look so far away you feel overwhelmed before you even begin. When that happens, the best thing to do is set small, attainable goals along the way. You can use the same strategy…


Secrets Management, Reporting, and Encryption for Effective DevSecOps

May 18th, 2021

As more enterprises adopt DevSecOps, success stories keep piling up. The latest comes from CyberEdge Group in its 2021 Cyberthreat Defense Report. According to their survey of DevSecOps organizations: 45.8% deploy applications more quickly 47.2% deploy updates more quickly 38.5% reduce costs 38.3% reduce app security vulnerabilities What secrets do these organizations know that others…


Key Takeaways from the 2021 Cyberthreat Defense Report

April 27th, 2021

The recently released Cyberthreat Defense Report (CDR) 2021 from CyberEdge Group is packed with information about the rapidly evolving cyber security universe in the wake of a global pandemic.  Now in its eighth year, the 2021 CDR assessed the views of 1,200 IT security professionals representing 17 countries and 19 industries. It is one of…


Beyond Password Managers

March 16th, 2021

Passwords should be complex. Password management should be easy. Consumer password managers are popular solutions for personal password storage. These digital password vaults make it possible for people to have complex passwords for each website and application they use and help them avoid bad habits like writing passwords down or using the same password for…


Can You Keep a Secret? Your Secrets Management System Can

March 4th, 2021

There are many different types of secrets in a digital enterprise. Secrets management requires broader and deeper security controls than traditional enterprise password management. It requires a coordinated process for managing all types of secrets in a centralized way to ensure systems and data remain secure. Secrets management keeps all secrets safe, prevents secret sprawl,…


How to Remove Admin Rights Without Reducing Productivity

November 20th, 2020

This is a guide to the risks associated with admin rights and over-privileged users, and how to remove admin rights in order to reduce those risks.  There are many options for removing administrator rights, however you must always consider business operation—removing admin rights should never jeopardize productivity.  Why do organizations use admin rights in the…


Remote Worker Security: The Risks, Challenges, and Solutions

October 20th, 2020

The concept of working remotely, or granting remote access, isn’t anything new for most IT professionals. Most organizations have embraced a remote workforce, be it their own employees, contractors, consumers, business partners, and managed service providers. What does “working remotely” mean today? For IT professionals, remote access had been thought of as performing your job…


Insurance Leader Rolls Out Enterprise PAM Strategy

June 11th, 2020

One of my favorite parts of this job is speaking with our customers to understand why they chose our solutions, and how they are using them to solve their challenges. Recently, I spoke with one of our customers who described Secret Server as his “favorite security tool!” So, I thought I would share his story.  Insurance Leader…


10 Features Every PAM Solution Must Have

May 26th, 2020

The MoSCoW method is a prioritization technique used in project management and software to prioritize requirements. It stands for: Must have, Should have, Could have, and Won't have. Using this approach can help you build a common understanding among your stakeholders as you evaluate and select a privileged access management (PAM) solution. In this blog, we’ll focus on the 10…


How Do Passwords Work?

May 7th, 2020

If you want to make a purchase, post a comment in a forum, or even read content on many websites, you’re prompted to create (and remember!) a password. What’s going on when you create a password? And how does this process help keep your information safe? When you create a password on a website, that…