+1-202-802-9399 U.S. Headquarters

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘The Enterprise’

Top 5 privileged account security reports CISOs must have: What computers in Active Directory no longer exist?

July 24th, 2017

When you know which computers in Active Directory no longer exist or have been decommissioned, you can quickly take action to protect your organization from the multitude of risks presented by unknown or unmanaged systems and accounts. Hackers target your privileged account credentials for good reason. Once they gain access, they can escalate their privileges…


The Tide is Turning for Privileged Account Management and Security

July 14th, 2017

CyberArk’s latest preliminary earning report and investor reactions show they’re starting to lose sight on what the market is looking for. For years CyberArk has been the biggest and, in many cases, the only player in the Privileged Account Management space.  When you’re one of the first to market, it gives you a lot of…


Demystifying the EU General Data Protection Regulation – Let’s BUST the Myths

July 10th, 2017

Yes, you’ve all heard about it. Many companies have been raising the alarm about GDPR for months now, all offering protection and silver bullets to solve anything and everything to do with GDPR—all you have to do is install this one box. Right! It’s caused a lot of confusion and many questions, and organizations have…


Security: Powered by People

June 8th, 2017

Guest column by SailPoint. Author: Juliette Rizkallah The acceleration of cloud adoption is gaining more traction each day. If we’ve said it once, we’ve said it a thousand times, cloud is where the majority of enterprises are headed. It’s more than just your employees who are using the cloud to get things done; the cloud connects…


Part 1: How did my password get hacked? It’s simple…

May 11th, 2017

I wish that we could tell you that the reason your password and account were hacked was due to some really high tech and sophisticated character in a dark room lit only by a giant panel of computer monitors.  Just like you see on your favorite TV show.  Unfortunately, this isn’t the case. It’s not…


Cybersecurity Awareness: Empowering Our People

May 5th, 2017

Guest column by SailPoint, the leader in enterprise identity management, brings the Power of Identity to customers around the world. As both an industry pioneer and market leader in identity governance, SailPoint delivers security, operational efficiency and compliance to enterprises with complex IT environments. Author: Darren Rolls Like it or not, when it comes to…


Surprising Takeaways from the 2017 Verizon Data Breach Investigations Report

May 3rd, 2017

2016 was a major year for cyber-crime and disruption, with many major significant data breaches (the presidential elections), the Distributed Denial of Service (DDoS) attacks using a botnet of Internet of Things (IoT), and the biggest data disclosure to date, twice, with Yahoo. This is now the 10th version of the Verizon Data Breach Investigations Report…


Stop Blaming China & Russia for All Your Cyber Attacks Pt. 1

May 1st, 2017

In this two part series we will first debunk the 5 myths of sophisticated cyber attacks and then cover the ‘reality’ behind cyber criminal’s attacks and give you actionable cybersecurity hygiene steps to increase your security.  Cyber-attacks can originate from anywhere, but there appears to be an unabated trend of pointing the finger at either “sophisticated…


Top takeaways from Symantec’s Internet Security Threat Report 2017

April 27th, 2017

The latest release of the Symantec Internet Security Threat Report summarizes the state of cyber threats across the world.  “Symantec maintains one of the world’s most comprehensive vulnerability databases, currently consisting of more than 88,900 recorded vulnerabilities (spanning more than two decades) from 24,560 vendors representing over 78,900 products.” The report raises several key incidents…


How do I protect against ransomware?

April 25th, 2017

“Ransomware” is on the rise using “targeted phishing attacks” and is being used for financial blackmail and poison or corrupt data. No one is excluded from these threats and no company or individual is too small to be a target. Ransomware has become such a threat due to its many variations and its drastic impact in…