dcsimg

Privileged Access Management 2019: A Year in Review

Another year has passed, and cyber attacks did not take a vacation or enjoy any time off. Cyber attacks wreak havoc on businesses 24/7. And cyber threats constantly increase and evolve, so organizations must adapt to become resilient to the newest threats. Not all successful cyber attacks are sophisticated This year confirmed that not all cyber attacks are sophisticated, and they don’t always … [Read more...]

Could basic password security practices have helped prevent the latest Equifax lawsuit?

Fallout from the 2017 Equifax data breach is back in the news as a new class-action suit consolidated 373 previous lawsuits into one. Unlike previous lawsuits filed by Equifax customers, the latest action comes from shareholders that allege the company didn’t adequately follow or disclose security practices, including poor password management. If you google, “what is the most common password?” … [Read more...]

Why Usable Security Should Drive Your Decision in Selecting a PAM Tool for Your Organization

What is Usable Security At Thycotic ease of use has been a consistent focus with our products, but we have started to use the term Usable Security more frequently. Usable security is much more than a Thycotic marketing term. Usable security is an academic field of study that evaluates the usability of computer security. We believe that our focus on this concept differentiates us from our … [Read more...]

Limit access for third-party vendors without restricting their ability to get work done

Companies often work with outside experts, consultants and other third-party vendors who need privileged access to corporate resources. These third-party entities can’t do what they were hired to do if their access is too restrictive. You can’t maintain a strong security posture if access and oversight are too lax. How do you, a security professional, walk the line to provide just enough access … [Read more...]

SWIFT Controls, Cyber Crime and Privileged Access Management: Securing Banking and Finance

The Society for Worldwide Interbank Financial Telecommunication (SWIFT) provides financial messaging services to banks, financial institutions and corporations all over the world. The technology is used to exchange sensitive information about financial transactions by more than 11,000 customers in over 200 countries. Financial institutions: a major target for cyber criminals; a critical subject … [Read more...]

The Real Cost of PAM Software

A low price tag for PAM software doesn’t necessarily mean it’s the best overall value. Enterprise-scale PAM, like most software purchases, typically involves more than the initial license fee. Depending on your security goals, internal resources, and specific IT environment, you may need to plan for additional costs. It’s important to identify the total cost of PAM ownership as clearly as you can … [Read more...]

Privileged Access Management Best Practices

For the past two years, Gartner has named privileged access management (PAM) the top IT security priority. Privileged account credentials for domain admins, service, application, and root accounts are valuable targets. When attackers gain these credentials, they can exploit your most sensitive information and critical systems. Privileged access gives them power to alter data, change configurations … [Read more...]

New Product Launch! Thycotic Connection Manager centrally manages multiple remote sessions and integrates with Secret Sever for vaulted credentials

Connection Manager provides centralized management of multiple remote sessions Connection Manager is an advanced remote connection management solution that provides one place to manage and interact with multiple remote sessions. Connection Manager can scale across hundreds of different connections to improve productivity, strengthen security and tighten compliance. With the release of Connection … [Read more...]

Secret Server product update: Conquer common cloud challenges with the release of Secret Server 10.7

With this newest release, Secret Server not only further strengthens its PAM cloud leadership, but also its overall enterprise readiness and usability. With Secret Server 10.7, users can now: Discover, manage, and delegate access for Amazon AWS privileged accounts Use Secret Server’s command line interface (CLI) from Windows, Mac, and Linux/Unix workstations Meet even the strictest uptime … [Read more...]

Before the Breach: Leveraging PAM and VPAM solutions to protect privileged credentials

CISOs and their security teams have an impossible task; they must predict the most urgent threats posed to their organizations, then prioritize investments in technology solutions to defend against those threats. While it’s impossible for any organization to defend against every conceivable type of cyberattack, understanding basic threat vectors and vulnerabilities is critical, and the time to … [Read more...]