dcsimg

Protect Yourself at Work and Home to Avoid Becoming a Victim of Cyber Crime

Cybersecurity is no longer simply a technology challenge. It’s a challenge for everyone who interacts with technology. The protection of work and personal life are no longer separated. They’ve become intertwined thanks to social networks, the Internet of Things, and unlimited connectivity. This means cybersecurity is no longer solely the responsibility of a company IT department, but the … [Read more...]

How do you make cyber security tech buying decisions? Here’s what your peers say.

Commissioned by Thycotic, a research survey was conducted among more than 900 CISOs/Senior IT decision-makers across nine countries in August 2020. The report of survey results takes a close look at how IT and security professionals make technology buying decisions, and what most influences Boards to invest in cybersecurity. The new report, entitled, Cyber Security Team’s Guide to Technology … [Read more...]

National Cyber Security Awareness Month: If you connect it, protect it

Can you spot the red flags of a cyber crime? What behaviors do cyber criminals love to abuse? Here’s how to avoid being the next victim! Cyber security is no longer just a technology challenge. It’s a challenge for everybody who uses and interacts with technology daily. The protection and security of both your work and personal life are no longer separate—they have been … [Read more...]

The Impact of the California Consumer Privacy Act on Privileged Access Management

Consumers are demanding greater control and security over the collection and processing of their personal data. A bevy of privacy laws are rolling out across the world and multiple U.S. states, driving changes in data governance and security practices. The California Consumer Privacy Act (CCPA) has the broadest impact of any U.S. state or federal privacy law, as it directly impacts 40 million … [Read more...]

Thycotic shifts the language used in products and materials to promote inclusivity

This moment in 2020 is a flashpoint in time. We hear calls for a number of changes to address the current political and cultural climate.  As a security software company, our engineers have seen a lot of discussion around the use of terminology in technology that may be perceived as racist. Is it appropriate to use the terms master and slave? Is it appropriate to say blacklisting and whitelisting? … [Read more...]

Privileged Access Management for Industrial IoT

The convergence of operational technology (OT) and information technology (IT) has propelled “Industry 4.0” into the spotlight as the next wave of the industrial revolution. The Industrial Internet of Things (IIoT) brings IT and OT together in industries such as manufacturing, logistics, smart buildings, utilities, and critical infrastructure. Companies that get IIoT right will have a distinct … [Read more...]

The Twitter Hack and the Failure to Protect Privileged Access

Twitter. The biggest social media hack so far, and it could have been much, much worse! We all should be very worried. Could a tweet start a war, change the outcome of an election, cause a riot, or even get people to send money (bitcoin) to unverified BTC wallets? On Wednesday 15 July, we experienced a tweetstorm, but this time it was not the usual suspects. This time several of Twitter’s most … [Read more...]

IAM: The Future of Identities and How We’ll Get There

Identity and Access Management (IAM) is the ability to provision, manage, audit and secure digital identities to facilitate and enable approved, authentic requests or connections to view company data, services, systems, networks, and assets. This applies whether they are located on premise or in the cloud, based on roles and privileges assigned to each digital identity, both human and … [Read more...]

Privileged Access Management Expertise Boosts Your Cyber Security Career

Shortage of cyber talent is a top concern for 63% of senior executives, according to a recent Gartner survey. The number of unfilled cyber security positions is over four million, up from 2.9 million last year, says the latest (ISC)2 Cybersecurity Workforce Study. This includes 561,000 in North America, 291,000 in Europe, and a staggering 2.6 million gap in APAC. If you’re an IT pro with … [Read more...]

Think Differently About Unix / Linux Privilege Management

Security models have struggled to match the evolution of Unix. Over its long history, Unix has evolved and changed in many different ways. What started in Bell Labs 40 years ago has spawned more than 150 variants of Unix in use today. Unlike the linear progression of Windows operating systems, in which most organizations use a single version until it is replaced, many flavors of Unix are in use at … [Read more...]