dcsimg

New DevOps Secrets Vault Release Adds Key DevOps and RPA Integrations

We’ve discussed how DevOps and robotic process automation (RPA) are changing the game in previous blogs. We’re seeing steady growth in requests from our customers to integrate with more and more types of technology solutions, including DevOps and RPA. For DevOps, we’ve seen it mature to a point where most high-velocity organizations running on modern infrastructure have embraced it and instead of … [Read more...]

The robots are here. Actually, they’ve been here for a while

Every team across your organization is looking for ways to free up more time. In the past year, Robotic Process Automation (RPA) has exploded as a new way to remove tedious, repetitive tasks from the shoulders of humans and give them to—you guessed it—robots. RPA essentially creates a non-person account—a “bot”—that mimics the activities of a user. The bot accesses the user’s computer and … [Read more...]

DevOps Secrets Vault for Speed and Security

Most advances in DevOps today are being leveraged for speed. Continuous integration and continuous delivery (CI/CD) is driven by the need to meet internal demands, meet customer demands, and adapt to the competition. However, as the headlines constantly remind us, security can’t be overlooked in our rush to deploy. No matter where your organization is on the spectrum from monolithic code to … [Read more...]

Thycotic posts unprecedented year of industry awards recognition

This was an unprecedented year for industry recognition of Thycotic’s leading PAM software solutions, with Thycotic capturing 35 awards in 2019 alone.  That’s a record that few, if any, of our competitors in the Privileged Access Management space can match in terms of market awareness and acceptance. While too numerous to list all of them here, these awards are indicative of Thycotic’s growing … [Read more...]

Why are security and business goals at odds with each other?

Few jobs are more challenging than that of a CISO. Constantly on call and under intense pressure, they’re not only keeping critical systems running and sensitive data protected, but also working to uphold a rapidly evolving list of regulatory demands. Yet CISOs and their teams do much more than act as the company ‘bodyguard’. They add significant business value that enables the organisation to … [Read more...]

7 Best Books to Grow Your Cyber Security Career

Thanks to the increasing number of cyber-attacks globally, cyber security is now one of the most in demand career fields. Every year individuals and organizations face the looming threat that it will be the “the worst year yet”, so how are you supposed to stay ahead? A 2019 Cybersecurity Workforce Study by (ISC)² found, “The cyber security workforce needs to grow 145% to close the skills gap and … [Read more...]

Thycotic’s Cyber Security Predictions and Trends for 2020

Which cyber security predictions or trends do you think will become reality? 2019 has been an exciting and interesting year for those of us with an interest in cyber security.  The topic is top of mind for governments and business leaders around the world as they wrestle with the ever-evolving challenge of reducing cyber-attack risks. It’s become more apparent to us how AI (Artificial … [Read more...]

Could basic password security practices have helped prevent the latest Equifax lawsuit?

Fallout from the 2017 Equifax data breach is back in the news as a new class-action suit consolidated 373 previous lawsuits into one. Unlike previous lawsuits filed by Equifax customers, the latest action comes from shareholders that allege the company didn’t adequately follow or disclose security practices, including poor password management. If you google, “what is the most common password?” … [Read more...]

Why Usable Security Should Drive Your Decision in Selecting a PAM Tool for Your Organization

What is Usable Security At Thycotic ease of use has been a consistent focus with our products, but we have started to use the term Usable Security more frequently. Usable security is much more than a Thycotic marketing term. Usable security is an academic field of study that evaluates the usability of computer security. We believe that our focus on this concept differentiates us from our … [Read more...]

Limit access for third-party vendors without restricting their ability to get work done

Companies often work with outside experts, consultants and other third-party vendors who need privileged access to corporate resources. These third-party entities can’t do what they were hired to do if their access is too restrictive. You can’t maintain a strong security posture if access and oversight are too lax. How do you, a security professional, walk the line to provide just enough access … [Read more...]