dcsimg

5 Most Popular Password Cracking Tools: Protect Your Enterprise

Passwords. How on earth did we get here?  They’ve been around for so many years and yet there’s still so much to be said about them. In most organizations passwords are what make the difference between keeping cyber criminals out—and falling victim to a cyber-attack. And for the multitude of applications, systems and infrastructure of so many organizations, the only security control … [Read more...]

Best Practices and Cyber Security Tips for Working Remotely

Given the unusual recent circumstances, many employees around the world are finding themselves in a situation where they must work from home or remotely. I’ve been working remotely for almost 15 years, so I thought it would be great to share some of my experiences, cyber security best practices and tips, and lessons learned on how to stay focused. I am fortunate that Thycotic is a global company … [Read more...]

The CISO Research Report: CISOs thrive on being Guardians of the Business and maybe even the Galaxy

Is Data the new Oil? Some people maintain that “Data is the new oil”. Tech companies around the world are now ranking among the largest global companies. A number of them have values that exceed some countries’ GDP.  Tesla, some would argue, is a tech company that builds cars. It now has a market value that is bigger than both GM and Ford combined making it the … [Read more...]

IT Security Performance impacts the Boardroom

Cybersecurity has become a frequently debated risk, and according to the World Economic Report is a top-5 risk to world economies and stability. It’s slightly behind other risks such as natural disasters, failure to mitigate climate change, and extreme weather.  Cybersecurity now impacts almost everyone globally, exposes us to significant risks, and has quickly become everyone’s … [Read more...]

Why are security and business goals at odds with each other?

Few jobs are more challenging than that of a CISO. Constantly on call and under intense pressure, they’re not only keeping critical systems running and sensitive data protected, but also working to uphold a rapidly evolving list of regulatory demands. Yet CISOs and their teams do much more than act as the company ‘bodyguard’. They add significant business value that enables the organisation to … [Read more...]

Thycotic’s Cyber Security Predictions and Trends for 2020

Which cyber security predictions or trends do you think will become reality? 2019 has been an exciting and interesting year for those of us with an interest in cyber security.  The topic is top of mind for governments and business leaders around the world as they wrestle with the ever-evolving challenge of reducing cyber-attack risks. It’s become more apparent to us how AI (Artificial … [Read more...]

Privileged Access Management 2019: A Year in Review

Another year has passed, and cyber attacks did not take a vacation or enjoy any time off. Cyber attacks wreak havoc on businesses 24/7. And cyber threats constantly increase and evolve, so organizations must adapt to become resilient to the newest threats. Not all successful cyber attacks are sophisticated This year confirmed that not all cyber attacks are sophisticated, and they don’t always … [Read more...]

Service Account 201: Service Accounts in the Cloud

I wrote about the basics of service account management in Back to Basics: Service Account Management 101.  Before I dive into service accounts in the cloud, here’s a quick recap of that post. A quick recap on Service Accounts 101 What exactly are service accounts and why are they needed?  Most organizations have two types of accounts that are used for authentication and authorization. The … [Read more...]

Trick or Treat? Stay safe during National Cybersecurity Awareness Month in October, and beyond

Ah, October! Summer has officially come to an end and we’ve quickly moved on to jumpers, football, and pumpkin everything. October is also National Cybersecurity Awareness Month. The theme for 2019 is “Own IT. Protect IT. Secure IT.”  But it needn’t be scary, and the tricks or treats you get at the end of the month should be the fun and entertaining variety—not something that poses a risk to … [Read more...]

Can PAM and Zero Trust Coexist?

What is Zero Trust and why was it introduced? The concept of Zero Trust isn’t new; the term was coined by Forrester back in 2010 and was initially synonymous with a network security approach known as micro-segmentation. Micro-segmentation is a way to create secure zones in data centers and cloud deployments that allow you to isolate workloads and protect them individually. This approach is … [Read more...]