+1-202-802-9399 U.S. Headquarters

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘The Enterprise’

Top Tips: Extend Identity and Access Management to Protect All Privileged Accounts

April 18th, 2017

The traditional security perimeter is proving no longer an effective cyber security control and fast growing technologies like cloud, mobile and virtualization make the boundaries of an organization blurry. For many years, organizations have protected their valuable and sensitive information by building a fence around those assets. All the data following in and out of […]


The biggest Insider Threats and 5 steps federal agencies must take to reduce IT Security Risk

April 17th, 2017

NISPOM defines insider threat as “Anyone with authorized access to government resources that uses that access to do harm to the security of the U.S.” In the government space, both agencies, contractors, and IT staff will typically have a high level of privileged access. In some cases, they have specialized clearance levels so they can […]


VIDEO: Key Benefits of Privileged Behavior Analytics

April 5th, 2017

Wouldn’t it be nice to ignore the “clutter” around privileged accounts and be notified immediately when there are indicators of privileged account abuse? According to Forrester, it is estimated that 80% of breaches involve Privileged Accounts. If you don’t have a system in place, your organization may never detect a stolen credential. In this video, […]


U Behave Yourself… or consider User Behavior Analytics

March 9th, 2017

Get a load of this: an alarming 57 percent of Americans believe that they know as much, or more, about cybersecurity as their IT Directors, according to a comprehensive survey conducted on behalf of Blumberg Capital. This same group of individuals reported that keeping their work passwords secure (10 percent) is only a little more […]


How to create an Enterprise Password Policy that gets used

January 6th, 2017

Humans are fascinating creatures, and the way we think is intriguing and drives many career paths. But what does the human brain have to do with Security? And most importantly, what does it have to do with Password Policies? Understanding how the human brain works (at a high level) helps understand the best Password Policy […]


Infographic: How to Promote Information Security in the Workplace

January 5th, 2017

We were so impressed by the important data presented in this infographic (below) by the University of Alabama at Birmingham that we’re featuring it as a guest blog post. Did you know that the biggest threat to your organization’s data/information security could be you? You, the owner. You, the senior manager. You, the hard working […]


Measuring Security Awareness in Your Organization

September 26th, 2016

Information Security’s ability to educate and empower employees in their risk management responsibilities is a fundamental element of any business protection strategy. If employees in your company think IT Security is the owner of all security related business risk, you’re in big trouble. IT Security pros are paid to understand the range and depth of […]


3 Strategies for Helping CISOs Communicate to The Board of Directors

August 30th, 2016

A CISO’s ability to communicate becomes even more important when trying to get the attention of an executive board. Now that IT security is an essential part of risk management, chief information security officers (CISOs) must effectively present their case to c-level executives in order to articulate risk posture, explain strategy, or get more budget. […]


Using Secret Server as Proactive Security Defense at Saab

June 21st, 2016

As vice president and CIO at Saab Defense and Security USA LLC, Per Hammarin manages a 10 member IT team in Washington, DC which is part of a parent organization based in Sweden.  Over more than 30 years and progressive positions within the civil aircraft and defense subsidiary of the company known for its iconic [...]


10 Questions the Board of Directors Should Ask About Cybersecurity

June 7th, 2016

Corporate directors play an important role in ensuring their companies have sufficient policies and resources in place to address IT security and to respond in the event that the company suffers a cyber-attack. Board of directors should demand to receive appropriate and timely information to help them fulfill their oversight role in managing cyber risk. [...]