Why should you want to work for Thycotic?

As the Director of Recruitment and Employment at Thycotic, I constantly scour our Glassdoor reviews for input on this topic. I want to understand what makes our employees happy and why other people should want to work with us. With a Glassdoor rating of 4.9 and a 97% CEO approval rating, we must be doing something right. Those numbers are pretty impressive compared to many other organizations. So … [Read more...]

How SMEs can comply with the PCI DSS

Organisations that accept card payments are responsible for the security of customers’ payment information and must comply with the Payment Card Industry Data Security Standard (PCI DSS). The PCI DSS is a set of tools and measures to help you protect payment card data. It applies to all organisations that transmit, process or store such information, but small and medium-sized enterprises (SMEs) … [Read more...]

The Importance of a Capable Compliance Manager

The position of compliance manager is more important in today’s business landscape than at any other point in time. What, exactly, is their function? Borrowing a reference from the smash hit Star Wars movie franchise, compliance managers function as the mindful C-3PO androids that oversee the ethical and legal standing of a company. Not only do they implement the necessary standards as derived … [Read more...]

Email Security Trends for 2018

Email is the lifeblood of any business.  Read More … [Read more...]

Microsoft VDI | How to Improve It with Parallels RAS

Virtual desktop infrastructure (VDI) allows organizations to host a Windows desktop on a centralized server in a datacenter or on the cloud. However, Microsoft VDI can quickly turn into an expensive and complex undertaking if you choose the wrong desktop delivery solution. Parallels Remote Application Server (RAS) offers an easy-to-deploy, cost-effective, seamless VDI solution that allows you to … [Read more...]

Cyber Attacks: A Suggested Approach to Proactively Mitigate Risk

The cyber threat landscape has changed dramatically over the last few years, with the global cost of cyber-crime exceeding $600 billion in 2017. Attacks are becoming more persistent, intelligent and frequent than ever before. In this whitepaper, we will delve into what we currently understand about the threat landscape in relation to both previous and more recent cyber-attacks on individuals … [Read more...]

How to Prepare for a Crisis You Couldn’t Possibly Predict

On the morning of May 18, 2012, at precisely 11:05, Nasdaq planned to execute the first trade in in Facebook’s hotly anticipated initial public offering. The opening trade was an auction of sorts—buyers and sellers entered orders, and Nasdaq calculated a price that would cause as many shares as possible to change hands. As the start of trading approached, hundreds of thousands of orders poured in. … [Read more...]

Slingshot Malware Uses IoT Device in Targeted Attacks

A new and very advanced malware attack has been discovered by Kaspersky Lab. The malware named Slingshot, due to a string in one of the hijacked system DLLs, is a sophisticated attack that leads to a nasty rootkit. The final rootkit named Cahnadr takes control of system processes, allowing for monitoring of keystrokes, clipboard, network traffic and more. Background Kaspersky Lab recently analyzed … [Read more...]

Edge Computing Vs Fog Computing

The cloud liberated computing power, applications, and data storage from reliance on specific hardware managed in a specific location. But the Cloud does typically exist in a specific location: a facility somewhere with racks of servers. … [Read more...]

Investors concerned about smartphone addiction; Apple responds with new webpage

Hot on the heels of an open letter from investors urging Apple to do more to protect children from smartphone addiction, the tech giant has recently dedicated a page on their website to families. The “Families” page, which can be accessed at apple.com/families, contains tools parents can use to set restrictions on devices accessible to their kids, manage in-app purchases, keep track of … [Read more...]