dcsimg

How do you make cyber security tech buying decisions? Here’s what your peers say.

Commissioned by Thycotic, a research survey was conducted among more than 900 CISOs/Senior IT decision-makers across nine countries in August 2020. The report of survey results takes a close look at how IT and security professionals make technology buying decisions, and what most influences Boards to invest in cybersecurity. The new report, entitled, Cyber Security Team’s Guide to Technology … [Read more...]

2020 Global State of Least Privilege Report

New Global Survey Reveals Why 20% of Organizations Fail When Implementing Least Privilege Cyber Security Thycotic partnered with Cybrary, the cyber security workforce online training platform, to conduct a global survey of IT professionals focusing on how organizations are implementing a least privilege strategy. A new report summarizing the survey results reveals important insights for anyone … [Read more...]

The CISO Research Report: CISOs thrive on being Guardians of the Business and maybe even the Galaxy

Is Data the new Oil? Some people maintain that “Data is the new oil”. Tech companies around the world are now ranking among the largest global companies. A number of them have values that exceed some countries’ GDP.  Tesla, some would argue, is a tech company that builds cars. It now has a market value that is bigger than both GM and Ford combined making it the … [Read more...]

The Black Hat 2019 Hacker Survey Report and Black Hat / Defcon 27 Recap

Brought to you by Thycotic Well folks, Black Hat 2019 conference has come and gone. Around 19,000 InfoSecurity professionals from around the world came to Las Vegas to learn, share, educate and disclose security research on the latest vulnerabilities, cyber threats, cyber attacks and techniques used to bypass popular cyber security methods—the same methods used by … [Read more...]

Are We Becoming an Industry of PAM “Haves” and “Have-Nots?”

We are worried. A few years back, Gartner reported that more than 65% of organizations allow unrestricted, unmonitored and shared use of privileged accounts. (Forecast Snapshot: Privileged Access Management, Worldwide, 2017). Surely, we thought, with high-profile cyber-attacks in the news and rapid growth of the PAM industry, that number must be decreasing. So, at the beginning of this year, we … [Read more...]