+1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘Passwords and Authentication’

Cyber Security Responsibilities: Who owns your organization’s PAM Policy Template?

January 16th, 2018

Who is responsible for creating, implementing and overseeing your organization’s Privileged Account Management Policy template? And what is at risk if no individuals or departments are named to ensure that your users and systems are in compliance with your PAM Policy? Let’s get the easy part out of the way: if your organization has its…


Privileged Password 101: What exactly is it?

December 15th, 2017

As the total universe of passwords will likely grow to more than 300 billion by 2020, people and organizations across the world face a massively growing cyber security risk from hacked or compromised user and privileged accounts—sometimes a single password being the only security control preventing cyber criminals from gaining access to the victim’s sensitive…


Taking the Anxiety out of Service Account Management

November 14th, 2017

“Service Account Management” is a deceptively simple term for a process that can be full of uncertainty and justifiable fears. Service Accounts can be the Active Directory accounts attached to your Windows Services, Scheduled Tasks, Application Pools, and more mission critical services that keep your organization operating and in business. The mere thought of having…


Let’s Play a Game of Password “Fact or Fiction”

October 26th, 2017

Guest column by SailPoint, the leader in enterprise identity management, brings the Power of Identity to customers around the world. As both an industry pioneer and market leader in identity governance, SailPoint delivers security, operational efficiency and compliance to enterprises with complex IT environments. Author: Darren Rolls With so much confusion and false advice around password security,…


How to Crack an Active Directory Password in 5 Minutes or Less

October 12th, 2017

Guest column by Semperis. Author: Noa Arias, Director of Marketing at Semperis The massive Equifax data breach compromised sensitive information for roughly 143MM people and is a sobering reminder that security flaws still exist in most organizations. The fact is that most enterprises use Active Directory as the cornerstone of their IT systems and, while AD can…


Cyber Security Awareness Month: 6 Simple Steps to Online Safety

October 3rd, 2017

Why do we continue to see so many cyber breaches in spite of our heightened awareness?  When we examine why many of the breaches in recent years have occurred, we can identify three major culprits: the Human Factor, Identities and Credentials, and Vulnerabilities. As a digital social society we are sharing more information publicly, causing…


Top 5 privileged account security reports CISOs must have: What Privileged Account passwords are expiring this week?

August 31st, 2017

How do you know when a password is about to be changed according to an assigned password rotation interval? Or when a privileged account or any other item stored within your privileged account management tool is reaching the end of its validation period and needs to be renewed? In this exclusive 5-part Thycotic educational series…


Passwords and Biometrics. Can they coexist, and should they?

August 23rd, 2017

The vision of a biometrics-led future for IT security is breathtaking, but is there a place in the future for passwords? Or are passwords ancient history? Passwords Need Better Management, Not Replacement Forget your passwords. They’re ancient history. That’s the message you’ll increasingly see if you keep up with the latest developments in security. But…


What is Biometric Authentication?

August 8th, 2017

Bio authentication, or biometric authentication, is a method of authentication (proving you are who you say you are) based on something biological to the human being.  Biometric authentication is another form of multi-factor authentication (providing several separate pieces of evidence proving who you are), and can be used in conjunction with another form of authentication,…


The Pros and Cons of Frequent Password Rotation

May 31st, 2017

What this title really should say is “the cons and cons of frequent manual password rotation”.  To be honest, I can’t think of a single good reason why anyone should be subjected to frequent manual password rotations.  There is nothing about that concept that screams “Good Idea”. Now, before you run off let me explain.…