dcsimg

Privileged Identity Management (PIM) and Identity-Centric Security Controls

The number of identities in the enterprise is exploding. Gaining control of identities related to people as well as machines is a challenge for many organizations. You need to know who your users are and what they do. If you experience a security incident, you must be able to reverse engineer who did what in order to meet compliance requirements and make sure it doesn’t happen again. Therefore, … [Read more...]

Thycotic President and CEO, James Legg, Named Executive of the Year 

Thycotic’s own James Legg has been named Executive of the Year in the Global Excellence Award’s Security Software category for his leadership in the cybersecurity space. As President and CEO, Legg has spearheaded a culture of talent at Thycotic, cultivating the organization’s overall success and revenue growth rate averaging 3x faster than others in the Privileged Access Management (PAM) … [Read more...]

Protecting IoT and Machine Identities (IDs) with Automated PAM Tools

The most recent Forrester Wave for privileged identity management recognized that machine identities (IDs) are growing at twice the rate of human identities.  Much of this increase is due to the widespread adoption of Internet of Things (IoT) and automation through digital transformation initiatives that rely on cloud-based applications. The proliferation of connected devices and automation is … [Read more...]

Active Directory Security and Hardening: An Ethical Hacker’s Guide to Reducing AD Risks

Approx. reading time: 8-10mins  This blog is intended for: IT and System Admins IT Security IT Auditors Pen Testers Tech Geeks Anyone moving into a career in Cybersecurity Skip to most common Active Directory misconfigurations In this post, we’re going to focus on common cyber-attacks that target Active Directory (AD). Active Directory is deployed across many … [Read more...]

SolarWinds Sunburst: One of the biggest cyber attacks targeting the software industry supply chain in history

Over the past weeks, we’ve learned more about one of the biggest cyber attack on the software industry supply chain.  This attack is a wake-up call for the software industry. It’s a true “mass indiscriminate global assault” as quoted by Brad Smith whom I regard as one of the most respected software leaders. His words during the CES technology trade show keynote should not be taken casually.  … [Read more...]

Thycotic Named a 2021 Gartner Peer Insights Customers’ Choice for Privileged Access Management for Large Enterprise, Finance, and North America

The Thycotic team is excited to announce that we have been recognized as a Customers’ Choice in the January 2021 Gartner Peer Insights ‘Voice of the Customer’: Privileged Access Management Markets Large Enterprise, Finance, and North America. Our team at Thycotic takes great pride in this distinction, as customer feedback continues to shape our products and services. The Gartner Peer Insights … [Read more...]

Top 5 Hacking and Cyber Security Books of 2020

Continuous learning is a top priority for me.  It’s critical to stay updated on the latest cyber security methods, technologies, strategies, and developments. 2020 brought the opportunity for us to indulge in some additional reading and learn new skills from incredible industry experts. From a young age, I struggled reading the likes of Shakespeare and was more interested in the … [Read more...]

A look behind the scenes of a Wi-Fi Hack: What are the secrets?

You snag a seat at your local café and open your laptop. Maybe you’re on the patio, grateful for the heater. The scent of coffee powers up your brain. The low hum of people chatting is welcome, after months of isolation. The logon page appears as you search for the Wi-Fi in your settings. Despite the security risks of free Wi-Fi, 81% of people readily connect What you don’t know is the backpack … [Read more...]

Least Privilege Examples, as told by the Three Ghosts of “A Christmas Carol”

With the holiday season upon us, it’s a good time to settle down with a beloved story. I re-watched the Charles Dickens classic, A Christmas Carol, the other day (well, actually it was Scrooged with Bill Murray, of course) and found myself thinking about the parallels with cyber security. Really, I did. In the story, Ebenezer Scrooge is first visited by the Ghost of Christmas Past. They watch … [Read more...]

Cyber Security Trends and Predictions for 2021, and Reflections on 2020

Well, 2020 was surely a year to remember—or one that most of us will want to forget.  No one could have predicted the turn it would take, and some are still trying to decide what to do with all the toilet paper they bought (which at some point was possibly one of the highest valued assets people owned second to bitcoin.) The year was likely a gap year for most kids and university students.  The … [Read more...]