dcsimg

Thycotic Named to Inc. 5000 for Sixth Consecutive Year

Global Leader in Privileged Access Management Ranks Number 2730 on Prestigious List of Nation’s Fastest-Growing Private Companies WASHINGTON, D.C., August 17, 2018 — Thycotic, a provider of privileged access management (PAM) solutions for more than 10,000 organizations worldwide, today revealed the company is No. 2,730 on the 37th annual Inc. 5000. This is the sixth year in a row that … [Read more...]

NSA Adviser Lists The Top Culprits for Nation State Hacking at DEF CON

The former chief of the NSA’s elite Tailored Access Operations Unit told DEF CON attendees who the top culprits for Nation State attacks are, and the results won’t surprise you at all. Except that he left the US off the list… … [Read more...]

Liar, liar, pants on fire! Barclays phish claims cards explode

We feel compelled to relay the dire warning from this Barclays snail-mail letter, which we acquired through social media, therefore it must be true. Warning: Barclays debit cards may catch fire! The letter reads as follows: Dear costumer, Many of our bank costumers have reported that their debit cards have caught fire while they are in wallets and purses, and so as a precushion we are issuing an … [Read more...]

Manage Virtual Machines On-Premises and in the Public Cloud

Virtualization is becoming more and more popular among IT communities, and with good reason. But that popularity will require a greater level of vigilance as well. … [Read more...]

The real estate industry embraces IT software to get ahead

Selling a home or leasing a space is built on relationships. Any compromise of sensitive data could lead to big problems for both clients and the professionals that they trusted to keep their data safe. … [Read more...]

How Secure Are Cloud Networks in 2018?

There is no doubt cloud computing is sweeping across the enterprise world. RightScale’s 2018 State of the Cloud … [Read more...]

SecurityCenter Innovation Continues with 5.7 Release

Tenable SecurityCenter 5.7 enhancements address the vulnerability management (VM) needs of today’s modern and highly mobile workforce. As digitization continues and companies invest in a highly mobile workforce, it’s important they have a VM solution with automated, continuous and accurate visibility into their IT assets in order to meet their growing needs. We recently shared how we’re invested … [Read more...]

How Data Access Governance Compliments Privileged Access Management

It’s that time of year when you might be expecting many of your employees (some of which will be privileged users) to take some well-earned holidays. In their absence, much of the work is delegated to other members within the organization or even to contractors in some cases. In the case of your privileged users, for this to happen, often temporary access needs to be provided. Managing this … [Read more...]

Final call: register for our upcoming webinar ‘How to implement an information security management system’

Increasingly stringent data security laws and regulations in Ireland and the rest of Europe – combined with a rapidly evolving cyber threat landscape – call for stronger, smarter and more robust data security solutions. Security teams are constantly challenged to protect the information their organisation holds and comply with a growing list of regulations requiring information security measures … [Read more...]

Tenable Drives Continued Innovation with Release of SecurityCenter 5.7

Tenable®, Inc., the Cyber Exposure company, today announced the release of SecurityCenter® 5.7, with new enhancements designed to help customers assess and manage the security posture of their mobile workforce at scale. In addition to existing integrations with CyberArk and Thycotic, the latest version also includes new integrations with Bomgar and BeyondTrust privileged access management … [Read more...]