dcsimg

How Recent Analyst Research can Help You Find the Right PAM Vendor

According to recent technology buying decision research sponsored by Thycotic, a significant number of executives, IT security and operations teams look primarily to the advice of independent analysts when evaluating a PAM or PIM solution that would work best for their organizations. That means independent analysis becomes very important in identifying vendors that belong on your short list for … [Read more...]

How do you make cyber security tech buying decisions? Here’s what your peers say.

Commissioned by Thycotic, a research survey was conducted among more than 900 CISOs/Senior IT decision-makers across nine countries in August 2020. The report of survey results takes a close look at how IT and security professionals make technology buying decisions, and what most influences Boards to invest in cybersecurity. The new report, entitled, Cyber Security Team’s Guide to Technology … [Read more...]

What does world-class Identity Governance look like?

Identity governance is a critical foundational practice required to secure and manage privilege and access across the enterprise. Organizations are required to demonstrate an enterprise identity governance program that complies with nearly every significant compliance audit for almost every industry. Identity governance programs are typically deployed as part of the security stack that includes … [Read more...]

Rising to the Modern PAM Challenge

What drives change in the security space? Either a significant shift in the business environment disrupts how people work, or technology advancements impact the attack surface. Today, security teams are facing both challenges. Remote work is here to stay. No company that I’ve talked with has plans to bring the full workforce back to the office any time soon, if ever. Meanwhile, users are … [Read more...]

Thycotic named a Leader in the 2020 Gartner Magic Quadrant for Privileged Access Management

Thycotic is proud to announce that we have been named a Leader in the Gartner 2020 Magic Quadrant for Privileged Access Management (PAM).  Based on our ability to execute and completeness of vision, Thycotic has been positioned as a Leader in the new Gartner 2020 Magic Quadrant for PAM. This marks a major milestone in our growth as a company and in the recognition … [Read more...]

Privileged Access Management for Industrial IoT

The convergence of operational technology (OT) and information technology (IT) has propelled “Industry 4.0” into the spotlight as the next wave of the industrial revolution. The Industrial Internet of Things (IIoT) brings IT and OT together in industries such as manufacturing, logistics, smart buildings, utilities, and critical infrastructure. Companies that get IIoT right will have a distinct … [Read more...]

PAM cloud security is different. Let me explain why

The 2020 Verizon Data Breach and Incident Report (DBIR) published in May gives a clear indication of where privileged access management (PAM) security is going these days. And the forecast is for cloudy skies ahead.  That’s because: 77% of cloud breaches are due to compromised credentials Attacks on web applications more than doubled in 2019 With credentials as the overwhelmingly preferred attack … [Read more...]

EU GDPR two years in: What’s happened so far, and what’s in store for the future?

On May 25th, 2020 EU GDPR was 2 years old and it passed with little noise.  I guess that everyone’s been distracted by other events such as the COVID-19 Pandemic which has put the world on pause for the time being, and that includes EU GDPR. EU GDPR has raised the bar for digital rights, sovereignty, privacy, and security around how EU Citizens’ data is collected and processed.  Personal … [Read more...]

5 Top Takeaways from the Verizon Data Breach Investigations Report 2020

The latest Verizon Data Breach Investigations Report 2020 is now publicly available to download or read online. As one of the industry’s top cyber security reports, the 13th Edition of the Verizon Data Breach Investigations Report (VDBIR) is one of our leading indicators of what causes security incidents and why data breaches occur.  With researchers analyzing 157,525 incidents and 3,950 confirmed … [Read more...]

Insurance Leader Rolls Out Enterprise PAM Strategy

One of my favorite parts of this job is speaking with our customers to understand why they chose our solutions, and how they are using them to solve their challenges.  Recently, I spoke with one of our customers who described Secret Server as his “favorite security tool!”  So, I thought I would share his story.  Insurance Leader Rolls Out Enterprise PAM Strategy When a national insurance … [Read more...]