dcsimg

Insurance Leader Rolls Out Enterprise PAM Strategy

One of my favorite parts of this job is speaking with our customers to understand why they chose our solutions, and how they are using them to solve their challenges.  Recently, I spoke with one of our customers who described Secret Server as his “favorite security tool!”  So, I thought I would share his story.  Insurance Leader Rolls Out Enterprise PAM Strategy When a national insurance … [Read more...]

10 Features Every Privileged Access Management Solution Must Have

The MoSCoW method is a prioritization technique used in project management and software to prioritize requirements. It stands for: Must have, Should have, Could have, and Won’t have. Using this approach can help you build a common understanding among your stakeholders as you evaluate and select a privileged access management (PAM) solution. In this blog, we’ll focus on the 10 must-have … [Read more...]

How Do Passwords Work?

If you want to make a purchase, post a comment in a forum, or even read content on many websites, you’re prompted to create (and remember!) a password. What’s going on when you create a password? And how does this process help keep your information safe? When you create a password on a website, that password isn’t stored verbatim on the website’s server. That’s because your password would be … [Read more...]

The Landscape of PAM is Changing – Customers Want Mobile PAM

At Thycotic, we’re watching the landscape of our customers’ privileged access management needs evolve. PAM can no longer be simply a web application hosted on premise; our customers are telling us they need flexible deployment and access options. More day-to-day business operations need access to data, applications, and platforms Organizations are also acknowledging that PAM protection and … [Read more...]

ServiceNow Integration Removes Bottlenecks for Service Account Governance

Many IT operations teams are working hard to move beyond a reactive, service-desk approach. They are taking on broader responsibilities for proactive management and measuring the business impact of their efforts for employees and customers. For a comprehensive view of IT-related projects, many organizations rely on IT service management systems (ITSM) that account for all activities and results … [Read more...]

Cyber-criminals are targeting your Service Accounts, and Regulators are taking notice

For the past few months we’ve been highlighting the critical nature of service accounts  and the importance of governing service accounts appropriately.  Recently, a customer came to us following a Sarbanes-Oxley (Sox) audit they failed largely due to mismanaged service accounts. It’s a story we’re hearing more and more frequently. Regulators are finally catching on to what we already … [Read more...]

How to protect service accounts without losing your mind: Automated tools!

Here at Thycotic, we are always banging the drum on the importance of securing privileged access. Early in 2019, we got a glimpse of what can happen if you don’t when more than 100 million credit applications at Capital One were stolen by an individual in a security breach that involved a web service and compromised privileged account. The attacker apparently got into the network through a … [Read more...]

Could basic password security practices have helped prevent the latest Equifax lawsuit?

Fallout from the 2017 Equifax data breach is back in the news as a new class-action suit consolidated 373 previous lawsuits into one. Unlike previous lawsuits filed by Equifax customers, the latest action comes from shareholders that allege the company didn’t adequately follow or disclose security practices, including poor password management. If you google, “what is the most common password?” … [Read more...]

Privileged Access Management Best Practices

For the past two years, Gartner has named privileged access management (PAM) the top IT security priority. Privileged account credentials for domain admins, service, application, and root accounts are valuable targets. When attackers gain these credentials, they can exploit your most sensitive information and critical systems. Privileged access gives them power to alter data, change configurations … [Read more...]

Before the Breach: Leveraging PAM and VPAM solutions to protect privileged credentials

CISOs and their security teams have an impossible task; they must predict the most urgent threats posed to their organizations, then prioritize investments in technology solutions to defend against those threats. While it’s impossible for any organization to defend against every conceivable type of cyberattack, understanding basic threat vectors and vulnerabilities is critical, and the time to … [Read more...]