dcsimg

How to Protect Your macOS Endpoints with Shift from KEXT to SYSEX

Cue music: Ch-Ch-Cha-Changes In recent macOS releases, Apple has been drawing attention to third-party software that uses technology like kernel extensions and system extensions. This technology allows users to install components or apps that extend the native capabilities of the macOS operating system. Apple’s deprecation of kernel extensions (KEXTs) and introduction of Endpoint Security Enabled … [Read more...]

Every system is a privileged system: Incorporating Unix/Linux in your privilege management strategy

Lately we’ve been banging the drum that “every user is a privileged user,” meaning privileged users aren’t limited to system administrators but also include business users with access to applications and endpoints linked to critical business data and functions. The second verse to that refrain is that “every system is a privileged system.” Within your IT environment, laptops, servers, databases, … [Read more...]

Bring to Light the Security Risks of Web Applications run by Shadow IT

A quiet proliferation of SaaS and web applications and infrastructure with web-based interfaces is taking place throughout your organization. These applications are often essential to business, financial, and technical users. Yet, security and operations folks who are tasked with safeguarding your entire IT environment are likely unaware of the breadth of applications in use. Even when they are … [Read more...]

Role-Based Access Control for a Complex Enterprise

What is role-based access control (RBAC)? Role-based access control, or RBAC, is the antidote to piecemeal user and permission management. RBAC provides a mechanism for system administrators to set policies and apply them as appropriate. A core tenet of RBAC is to preemptively set rules which apply to all users, rather than making on-the-fly decisions about who should be able to access what. It … [Read more...]

Privilege Manager 10.8: Simplifying endpoint privilege management through usable security

A powerful new interface and additional enhancements make Privilege Manager 10.8 an important release to ensure usable security.  Privilege Manager is the most comprehensive endpoint privilege elevation and application control solution, capable of supporting enterprises and fast-growing organizations at cloud scale. Over the past year, our product teams and UX and human-computer interaction team … [Read more...]

The Twitter Hack and the Failure to Protect Privileged Access

Twitter. The biggest social media hack so far, and it could have been much, much worse! We all should be very worried. Could a tweet start a war, change the outcome of an election, cause a riot, or even get people to send money (bitcoin) to unverified BTC wallets? On Wednesday 15 July, we experienced a tweetstorm, but this time it was not the usual suspects. This time several of Twitter’s most … [Read more...]

Just-in-Time Privileged Access Eliminates the Danger of Standing Privileges

Granting users standing access to privileged resources violates the principle of least privilege and introduces significant risk. With undifferentiated access, users can (and do) take unauthorized actions because they’re given TOTAL control of a resource. They could give a password to another person, who could then access a resource without appearing in an audit trail. They could access critical … [Read more...]

Endpoint Security Demands a Defense-in-depth Strategy

Endpoints, the devices people use to access company resources, are a weak spot in corporate security. Compromised endpoints are a primary access point that cyber criminals use to infiltrate a network. Two-thirds of companies are compromised by exploits that originate with an endpoint. The volume of endpoint attacks is rising, as is the sophistication of attacks. There’s a marked spike in criminals … [Read more...]

Application Control Strategies Help You Prepare for the Unknown

One of the most significant challenges today within endpoint security via application control is the sometimes tedious task of application categorization to create whitelists, blacklists, and greylists. What is application control? Application control allows you to proactively manage and monitor all the applications running on your endpoints with policy-driven controls. Application control can be … [Read more...]

Usable Security and the Next Iteration of Privilege Manager

We focus on usable security. Here’s what that means for the next iteration of Privilege Manager It’s no secret that Thycotic is the usable security leader in the Privileged Access Management space. In the past year our UX team has been working on the entire product line to modernize and simplify the products’ experience. One of the biggest projects our team has been working on is the redesign of … [Read more...]