dcsimg

Privileged Account Management and Identity Access Management: Same Family, Different Strengths

From a cyber criminal’s point of view, obtaining privileged account information has the highest ROI of any attack strategy. A malicious actor with privileged account passwords in hand could infiltrate key databases and access highly sensitive data. To obtain this information, attackers use increasingly sophisticated tools and social engineering techniques which are extremely difficult for even the … [Read more...]

The EU GDPR is now in effect. What has happened so far?

Finally, the time has come. May 25th 2018 is now in the past, and the EU GDPR has come into effect after a two-year transition period. The earth is still rotating, the internet still kind of works. So what has happened, and have any lessons been learned yet? EU GDPR and Data Privacy Email SPAM MONTH Well firstly, we all lived through “spam month” as EU GDPR and Privacy updates poured into our … [Read more...]

The EU GDPR is now in effect. What has happened so far?

Finally, the time has come. May 25th 2018 is now in the past, and the EU GDPR has come into effect after a two-year transition period. The earth is still rotating, the internet still kind of works. So what has happened, and have any lessons been learned yet? EU GDPR and Data Privacy Email SPAM MONTH Well firstly, we all lived through “spam month” as EU GDPR and Privacy updates poured into our … [Read more...]

Gartner: Privileged Access Management is the #1 Cyber Security Priority for 2018

A recent report from Gartner reveals the top IT Security Projects for 2018 with Privileged Access Management as #1, Application Control #4 and Protecting Endpoints #6. Before we get into why Privileged Access Management (PAM) is the #1 Cyber Security Priority in 2018, let’s take a quick look at what lead up to this change Senior executives are more involved in cyber security than ever before.  In … [Read more...]

2018 Cyber Security Breaches: Client Concerns, Opportunities for Solution Providers

Cyber-criminal groups have an extensive arsenal of surveillance and research methodologies they use to search for even the smallest of vulnerabilities in your cyber security protections—vulnerabilities that enable them to infiltrate your organization, gather intelligence and access your systems. Thycotic’s 2018 Global Channel Partner Survey Report indicates that these cyber-criminals are largely … [Read more...]

Seven reports you can share with auditors and execs to demonstrate proactive privilege management

All major compliance bodies recommend or require a least privilege policy to protect sensitive data. Removing local administrative access on user workstations is a fundamental strategy for endpoint security to protect against both internal and external threats. Auditors will see that you have implemented a proactive security strategy to prevent malicious activity and accidental data breaches By … [Read more...]

Get Back to the Basics this World Password Day 2018

If you believe passwords will be killed off by biometrics, read this stat from a recent Cybersecurity Ventures report: “The world will need to secure over 300 billion passwords by 2020.” What happened to biometrics? Many visionaries declared that the release of Apple’s Face ID would call for the end of passwords as we know them. The reality is, it’s not that simple. Just months later … [Read more...]

2018 Global State of Privileged Access Management Risk and Compliance: Part 1

Most companies are FALLING SHORT on compliance when it comes to privileged accounts! Thycotic’s research shows Privileged Access Management is a Top Risk and Compliance requirement, yet it’s significantly failing to be fully implemented meaning that most companies fall short on compliance for privileged access. The majority of organizations begin to implement Privileged Access Management … [Read more...]

Symantec Internet Security Threat Report 2018: The Top Takeaways

It has been a very interesting past year with a few surprises along the way, but as expected cyber-crime grew significantly; financial impact was huge and many companies struggled to recover from cyber-attacks. Cyber security—or the lack of it—is rapidly impacting everyone’s daily life and there is no longer a disconnect between personal and work life. In the past cyber-attacks were usually only a … [Read more...]

Key takeaways from the 2018 Verizon Data Breach Investigations Report

The latest installment of the Verizon Data Breach Investigations Report 2018 is now available. It’s the 11th edition of the report, and not surprisingly, it reveals that hackers have continued to be very successful at using their hacking techniques (many which are well known) and we have failed to stop them. “HACKERS CONTINUE TO USE KNOWN EXPLOITS” This report is a must-read for cyber security … [Read more...]