+1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘Privilege Manager’

Everything you need to know about NIST 800-53

June 19th, 2018

The National Institute of Standards and Technology (simply referred to as NIST) sets the security standards, guidelines and recommended security controls for the Federal Information Systems and Organizations.  This extensive database of publications includes the FIPS (Federal Information Processing Standards), SP (NIST Special Publications), NISTIR (NIST Internal Reports) and the ITL Bulletin (NIST Information Technology…


Why is least privilege the place to start for endpoint security?

January 23rd, 2018

Because it will save you time and money.   Your end user’s computers are increasingly exploited as an attack vector used to attain accounts with local administrator rights on Windows or root access on Mac OS. There are a lot of solutions that promise malware detection and prevention. And you can buy more and more software to try to prevent these…


The Top 5 Applications You Should Blacklist Now

December 13th, 2016

Most organizations regularly deploy and use applications that contain significant vulnerabilities. These vulnerabilities are easily exploited by attackers to access systems and data running on those applications. Many of the vulnerabilities known as CVE’s (Common Vulnerabilities and Exposures) are posted on the National Vulnerability Database to inform IT professionals of the mitigation controls they must…


Protect Endpoints from Malware using Deny-First Whitelisting

November 16th, 2016

Malware is on the rise, and shows no signs of slowing. According to the AV-TEST Institute: • Through September 2016, nearly 600 Million different types of malware exist • Over 140 Million new types of malware are created every year • Over 11 Million new types of malware are discovered every month Traditional anti-virus and…


Protecting your network by implementing Least Privilege Policy

October 27th, 2016

If you’re still weighing up whether or not to implement the least privilege model in your organization, consider this: Cyber breaches and ransomware are a global epidemic. According to SANS: • 44% admitted one or more of their endpoints had been compromised in the past 24 months. • 85% of reported breaches involved desktops, 68%…


Universities under Attack—Securing student, faculty, and staff’s personal information

February 10th, 2015

Understanding the Size of the Education Industry Sometimes, businesses find out about a data breach the hard way – this was the case for Butler University in May 2013. Police investigating a case of identity theft in California discovered a flash drive on one of their suspects that contained the personally identifiable information (PII) of…