dcsimg

Your city does not have to be a victim of ransomware

These cities have a common foe. Albany, New York; Baltimore, Maryland; Orange County, N.C.; Sammamish, Wash; Atlanta, GA They have all been subject to Ransomware attacks in the past 12 months. The most recent victim being Baltimore, MD which has been the target of ransomware twice in the past year. According to the 2019 Verizon Data Breach Investigations Report, Ransomware remains a major threat … [Read more...]

The Redesign of Secret Server: What went into making Secret Server this good?

We are excited to introduce the redesign of Thycotic Secret Server! In 2019, Thycotic has invested heavily in UX. We have built a team of UX and Human Computer Interaction Specialists to lead these initiatives. We are improving the UX/UI of all Thycotic products in 2019 as we continue in our efforts to remain the leader in usable security products. The backbone of all Thycotic design is user … [Read more...]

KuppingerCole weighs in on Privileged Access Management vendors in new report

Analyst firm KuppingerCole just released a new report— Leadership Compass March 2019 vendor evaluation for Privileged Access Management (PAM).  Over more than 60 pages, KuppingerCole analyst Anmol Singh provides a thorough review of 20 PAM vendors in a rapidly growing PAM market. He emphasizes, “PAM has emerged as one of the most crucial IAM technologies that has a direct relevance and … [Read more...]

The Evolution from Password Managers to Privileged Access Management. Which is right for you?

In recent years the need for improved Identity and Access Management (IAM) has been growing. Businesses are enabling policies and technologies to authorize approved employees and 3rd party contractors’ access to the systems and applications required to perform their jobs. As companies move to the cloud, the already-challenging task of providing common and secure access and satisfying stronger … [Read more...]

Actions CISOs Must Take to Overcome Negative Perceptions

Chief Information Security Officers (CISOs) shoulder tremendous responsibility. They’re ultimately responsible for their company’s cyber security posture. At the same time, the security decisions they make also impact core business metrics such as productivity, cost savings, revenue growth, and brand perception. The world of today’s CISOs is a balancing act. On one hand, they are “enforcers” of … [Read more...]

Privileged Access Management Compliance Through the Eyes of an Auditor

Compliance audits are a stressful, time-consuming effort for many companies. In the Lockdown blog, we often talk about the tools and processes customers use to prepare for both internal and external information security audits. This time we thought we’d turn the tables and speak directly to an auditor to hear his perspective. In this post, auditor and Information Security Specialist Edgar … [Read more...]

Design Principles that Drive Thycotic’s Software User Experience Strategy

Users are the biggest risk to information security. That’s why it’s so important to have a usable software product, especially in the cyber security space. Our goal is to give people the agility and control they need to reduce risk. Usability is our North Star.   With this goal foremost in our minds, we’re building a growing team of usability experts, including cyber security software UX … [Read more...]

See Where You Place in the PAM Maturity Model

Many companies aren’t sure how to begin their PAM implementation or which security activities have the most impact on their goals. To help you stay on course, Thycotic has developed the first PAM Maturity Model, based on industry best practices that systematically lower privileged account risk, increase business agility and improve operational efficiency. The model gives you a strategic road map … [Read more...]

Incident Response: Are You Breach-Ready?

It’s no longer rare to see cyber-attacks in the daily news. From ransomware to data breaches to DDoS (Distributed Denial of Service) attacks, the incident is usually attributed to either cyber criminals or nation states, and almost always comes from beyond our own country’s borders and laws. Because of this, we worry about clicking on a web page or opening an attachment in an email, never … [Read more...]

Privileged Account Management and Identity Access Management: Same Family, Different Strengths

From a cyber criminal’s point of view, obtaining privileged account information has the highest ROI of any attack strategy. A malicious actor with privileged account passwords in hand could infiltrate key databases and access highly sensitive data. To obtain this information, attackers use increasingly sophisticated tools and social engineering techniques which are extremely difficult for even the … [Read more...]