dcsimg

Election Protection: How Cyber Criminals Could Steal Your Vote

How much should we worry about the security of the upcoming US presidential election? Could a hacker or nation-state actor influence the result? Well, there’s good news and there’s bad news for election cyber security. The good news is that The Cybersecurity and Infrastructure Security Agency and the FBI, in a joint statement, said they “have not seen cyber-attacks this year on voter … [Read more...]

Cyber Security and the Future of Connected Devices

Before I take you on a journey to the future of connected devices, let’s briefly reflect on how we got where we are today. During my career, I’m fortunate to have been involved in many exciting technology and digital innovations. It’s important to share some of these with you so you fully understand how amazing technology can be and what an exciting future lies ahead. That said, … [Read more...]

The Impact of the California Consumer Privacy Act on Privileged Access Management

Consumers are demanding greater control and security over the collection and processing of their personal data. A bevy of privacy laws are rolling out across the world and multiple U.S. states, driving changes in data governance and security practices. The California Consumer Privacy Act (CCPA) has the broadest impact of any U.S. state or federal privacy law, as it directly impacts 40 million … [Read more...]

What does world-class Identity Governance look like?

Identity governance is a critical foundational practice required to secure and manage privilege and access across the enterprise. Organizations are required to demonstrate an enterprise identity governance program that complies with nearly every significant compliance audit for almost every industry. Identity governance programs are typically deployed as part of the security stack that includes … [Read more...]

Rising to the Modern PAM Challenge

What drives change in the security space? Either a significant shift in the business environment disrupts how people work, or technology advancements impact the attack surface. Today, security teams are facing both challenges. Remote work is here to stay. No company that I’ve talked with has plans to bring the full workforce back to the office any time soon, if ever. Meanwhile, users are … [Read more...]

Thycotic shifts the language used in products and materials to promote inclusivity

This moment in 2020 is a flashpoint in time. We hear calls for a number of changes to address the current political and cultural climate.  As a security software company, our engineers have seen a lot of discussion around the use of terminology in technology that may be perceived as racist. Is it appropriate to use the terms master and slave? Is it appropriate to say blacklisting and whitelisting? … [Read more...]

Privileged Access Management for Industrial IoT

The convergence of operational technology (OT) and information technology (IT) has propelled “Industry 4.0” into the spotlight as the next wave of the industrial revolution. The Industrial Internet of Things (IIoT) brings IT and OT together in industries such as manufacturing, logistics, smart buildings, utilities, and critical infrastructure. Companies that get IIoT right will have a distinct … [Read more...]

EU GDPR two years in: What’s happened so far, and what’s in store for the future?

On May 25th, 2020 EU GDPR was 2 years old and it passed with little noise.  I guess that everyone’s been distracted by other events such as the COVID-19 Pandemic which has put the world on pause for the time being, and that includes EU GDPR. EU GDPR has raised the bar for digital rights, sovereignty, privacy, and security around how EU Citizens’ data is collected and processed.  Personal … [Read more...]

The Twitter Hack and the Failure to Protect Privileged Access

Twitter. The biggest social media hack so far, and it could have been much, much worse! We all should be very worried. Could a tweet start a war, change the outcome of an election, cause a riot, or even get people to send money (bitcoin) to unverified BTC wallets? On Wednesday 15 July, we experienced a tweetstorm, but this time it was not the usual suspects. This time several of Twitter’s most … [Read more...]

IAM: The Future of Identities and How We’ll Get There

Identity and Access Management (IAM) is the ability to provision, manage, audit and secure digital identities to facilitate and enable approved, authentic requests or connections to view company data, services, systems, networks, and assets. This applies whether they are located on premise or in the cloud, based on roles and privileges assigned to each digital identity, both human and … [Read more...]