dcsimg

Before the Breach: Leveraging PAM and VPAM solutions to protect privileged credentials

CISOs and their security teams have an impossible task; they must predict the most urgent threats posed to their organizations, then prioritize investments in technology solutions to defend against those threats. While it’s impossible for any organization to defend against every conceivable type of cyberattack, understanding basic threat vectors and vulnerabilities is critical, and the time to … [Read more...]

Building a PAM business case: cost-justifying privileged access management projects

Most IT or security projects require a formal approval process, and that often includes a written business case. An IT business case document can vary from a simple one-page write-up to a full-blown justification paper with detailed cost and return-on-investment calculations. Many organizations have standard business case templates, but here’s what type of information a business case generally … [Read more...]

How to Find Your Best Match Among Privileged Access Management Vendors

So, you want to bring on a Privileged Access Management (PAM) solution and you’re either selecting a vendor for the first time, or you may be “upgrading” from a typical password manager software product.  In any case, you’re probably looking for several PAM capabilities, as well as how best to deploy your proposed PAM solution: on premise or PAM in the cloud. Even small businesses are recognizing … [Read more...]

Top 5 Black Hat 2019 Sessions Not to Miss. Plus: Bonus Travel Tips to Hacker Cons

The Black Hat USA 2019 conference is about to start. Over 17,000 security professionals will come from all around the world to Las Vegas, USA. They will learn, share, educate and disclose security research on the latest cyber-threats and attacks, vulnerabilities, and techniques used to bypass security used by most governments and organizations globally. Without clear collaboration and … [Read more...]

Top 10 Best Cyber Security Podcasts of 2019

Podcasts have transformed the way we digest news, learn on the go, and optimize our commutes. With podcasts gaining popularity due to their ability to fit into our busy lives, a wave of new cyber security experts have launched a series of IT podcasts to keep us informed about the latest security threats, InfoSec tools, and cyber best practices. Below you’ll find our curation of the 10 best cyber … [Read more...]

Moving from on-premise to Privileged Access Management (PAM) in the cloud could be your next move

Are you considering moving from an on-premise PAM solution to one that delivers the security you expect for privileged credentials while still gaining the advantages of a cloud-based solution? If so, you’ll want to take a few tips from Tim Enders, Senior System Engineer at Loyola University Maryland’s Department of Technology Services—the Loyola University case study can be viewed here. About a … [Read more...]

Your city does not have to be a victim of ransomware

These cities have a common foe. Albany, New York; Baltimore, Maryland; Orange County, N.C.; Sammamish, Wash; Atlanta, GA They have all been subject to Ransomware attacks in the past 12 months. The most recent victim being Baltimore, MD which has been the target of ransomware twice in the past year. According to the 2019 Verizon Data Breach Investigations Report, Ransomware remains a major threat … [Read more...]

The Redesign of Secret Server: What went into making Secret Server this good?

We are excited to introduce the redesign of Thycotic Secret Server! In 2019, Thycotic has invested heavily in UX. We have built a team of UX and Human Computer Interaction Specialists to lead these initiatives. We are improving the UX/UI of all Thycotic products in 2019 as we continue in our efforts to remain the leader in usable security products. The backbone of all Thycotic design is user … [Read more...]

KuppingerCole weighs in on Privileged Access Management vendors in new report

Analyst firm KuppingerCole just released a new report— Leadership Compass March 2019 vendor evaluation for Privileged Access Management (PAM).  Over more than 60 pages, KuppingerCole analyst Anmol Singh provides a thorough review of 20 PAM vendors in a rapidly growing PAM market. He emphasizes, “PAM has emerged as one of the most crucial IAM technologies that has a direct relevance and … [Read more...]

The Evolution from Password Managers to Privileged Access Management. Which is right for you?

In recent years the need for improved Identity and Access Management (IAM) has been growing. Businesses are enabling policies and technologies to authorize approved employees and 3rd party contractors’ access to the systems and applications required to perform their jobs. As companies move to the cloud, the already-challenging task of providing common and secure access and satisfying stronger … [Read more...]