dcsimg

See Where You Place in the PAM Maturity Model

Many companies aren’t sure how to begin their PAM implementation or which security activities have the most impact on their goals. To help you stay on course, Thycotic has developed the first PAM Maturity Model, based on industry best practices that systematically lower privileged account risk, increase business agility and improve operational efficiency. The model gives you a strategic road map … [Read more...]

Least Privilege Uncovered

Organizations around the world are challenged by an ever-growing cyber threat landscape and are experiencing serious cyber fatigue. Their employees are dealing with constant information overload about cyber attacks, ransomware, identity theft and phishing scams. Employees are exposed to risky behavior For years, employees across all departments in most organizations have habitually practiced risky … [Read more...]

Back to the Basics: Service Account Management 101

Service accounts don’t have to be a nightmare. Get in control now.  Service accounts are typically used in operating systems to execute applications or run programs, either in the context of system accounts (high privileged accounts without any password) or a specific user account, usually created manually or during software installation.  On Unix and Linux they are often known as init or inetd, … [Read more...]

Thycotic’s Strategic Alliance program means Privileged Access Management Security for everyone

Privileged Access Management is an important and vital security solution that helps protect one of the most important assets in an organization.  Software vendors can simply enable and empower their solutions by integrating into the world’s most popular, friendly, easy-to-use and most valuable Privileged Access Management solution available. Organizations and governments around the world have … [Read more...]

The Black Hat 2018 Hacker Survey Report and Recap by Thycotic

Another Black Hat conference has come and gone and more than 17,000 international security professionals converged on Las Vegas, USA to learn, share, educate and disclose security research on the latest cyber threats, attacks, vulnerabilities and techniques used to bypass the security employed by most governments and organizations globally. Black Hat USA 2018 Conference in Las Vegas Of course, … [Read more...]

BUY, BUY, BUY, BUY is sometimes not the answer!

Strategy, vision, and innovation.  These are the key ingredients to creating software that’s good for people and business. Bomgar is desperately wanting to enter the growing Privileged Access Management (PAM) market. Originally, Bomgar started as a Secure Remote Desktop and Remote Support company in a market crowded with free and low-cost solutions.  Under pressure, Bomgar needed to move to … [Read more...]

Incident Response: Are You Breach-Ready?

It’s no longer rare to see cyber-attacks in the daily news. From ransomware to data breaches to DDoS (Distributed Denial of Service) attacks, the incident is usually attributed to either cyber criminals or nation states, and almost always comes from beyond our own country’s borders and laws. Because of this, we worry about clicking on a web page or opening an attachment in an email, never … [Read more...]

Hacking the US Elections: How Government Agencies Can Protect Themselves

The US midterm elections campaigns are well under way and expected to be held on Tuesday, November 6, 2018.  This midterm election is significant as it will take place right in the middle of President Trump’s first term and will likely be an indicator of the US citizens’ confidence in both the President and the Republican Party which holds a majority in both the Senate and the House. Foreign … [Read more...]

Back to the Basics: The problem with forcing regular password expiry

For many people and organizations around the world a single password is sometimes the only security control protecting their sensitive information, access to email and even their bank account. The traditional password best practice was to create a long, complex password that only you would know, and it protected one or two accounts; you likely used it to sign into Active Directory or email … [Read more...]

Back to the Basics: How do you define Privileged Access?

The Privileged Access Management Lifecycle and Path to Maturity Countless organizations are growing more and more concerned about the ever-evolving threat landscape of cyber-attacks, as they watch large well-known enterprise organizations falling victim to cyber-crime. Every year billions of records are stolen, identity theft increases, more credentials are abused and financial fraud is now … [Read more...]