dcsimg

How can you prevent insider threats when none of your insiders are actually “inside”?

Security teams can be so focused on blocking cyber attacks from outside that they turn a blind eye to potential threats within their own organizations. In fact, 34% of all breaches are caused by insider threats. Insider threats are uniquely difficult to defend against because insiders inherently require an elevated level of trust and access to get their jobs done. For example, system … [Read more...]

How Do Passwords Work?

If you want to make a purchase, post a comment in a forum, or even read content on many websites, you’re prompted to create (and remember!) a password. What’s going on when you create a password? And how does this process help keep your information safe? When you create a password on a website, that password isn’t stored verbatim on the website’s server. That’s because your password would be … [Read more...]

Building the case for privileged session management

You simply can’t be everywhere at once. How can you keep tabs on your most sensitive and critical systems? If only you had eyes in the back of your head. Even organizations with well-documented PAM policies don’t simply trust that people are doing the right things Privileged session management increases oversight and accountability so you can mitigate the risk of privileged account misuse. Even … [Read more...]

Best Practices and Cyber Security Tips for Working Remotely

Given the unusual recent circumstances, many employees around the world are finding themselves in a situation where they must work from home or remotely. I’ve been working remotely for almost 15 years, so I thought it would be great to share some of my experiences, cyber security best practices and tips, and lessons learned on how to stay focused. I am fortunate that Thycotic is a global company … [Read more...]

Lessons we’ve learned: the EU NIS directive and securing critical infrastructure

What is NIS? The Networks & Information Systems (NIS) Directive was created by the European Union (EU) with the specific aim of raising levels of overall cyber security and network resilience for critical infrastructure. NIS improves overall EU cyber security by driving organizations to adopt enhanced security for critical infrastructure. The NIS Directive & Critical Infrastructure … [Read more...]

A Guide to Managing and Securing Privileged Users

Organizations often have two to three times more privileged user accounts than individual employees. Securing these special accounts is vital to protecting sensitive information and critical systems from cyber attack. To help people stay productive, you must provide appropriate access for privileged users while also minimizing risk. Privileged users require special handling, training, and … [Read more...]

IT Security Performance impacts the Boardroom

Cybersecurity has become a frequently debated risk, and according to the World Economic Report is a top-5 risk to world economies and stability. It’s slightly behind other risks such as natural disasters, failure to mitigate climate change, and extreme weather.  Cybersecurity now impacts almost everyone globally, exposes us to significant risks, and has quickly become everyone’s … [Read more...]

The robots are here. Actually, they’ve been here for a while

Every team across your organization is looking for ways to free up more time. In the past year, Robotic Process Automation (RPA) has exploded as a new way to remove tedious, repetitive tasks from the shoulders of humans and give them to—you guessed it—robots. RPA essentially creates a non-person account—a “bot”—that mimics the activities of a user. The bot accesses the user’s computer and … [Read more...]

DevOps Secrets Vault for Speed and Security

Most advances in DevOps today are being leveraged for speed. Continuous integration and continuous delivery (CI/CD) is driven by the need to meet internal demands, meet customer demands, and adapt to the competition. However, as the headlines constantly remind us, security can’t be overlooked in our rush to deploy. No matter where your organization is on the spectrum from monolithic code to … [Read more...]

Thycotic posts unprecedented year of industry awards recognition

This was an unprecedented year for industry recognition of Thycotic’s leading PAM software solutions, with Thycotic capturing 35 awards in 2019 alone.  That’s a record that few, if any, of our competitors in the Privileged Access Management space can match in terms of market awareness and acceptance. While too numerous to list all of them here, these awards are indicative of Thycotic’s growing … [Read more...]