dcsimg

Lower Risk of PowerShell Vulnerabilities with Privilege Management

PowerShell and other scripting tools are part of an IT professional’s arsenal. They are incredibly powerful, a force multiplier which allows you to automate important or frequently used tasks. The same traits that make these tools a boon for IT pros also make them valuable to malicious actors who can use them to exponentially increase their reach within an organization.   Allowing too many people … [Read more...]

5 Spooky Privilege Security Mistakes that Will Haunt Your Organization

It’s a dark and stormy night. Suddenly your system locks up. Then you get a message, demanding online payment to release your sensitive data back to you. Unfortunately, this isn’t a Halloween prank. Ransomware is on the rise and organizations of all types are falling victim. Your risk of cyber-attack exponentially increases if you’ve made any of the mistakes below. The good news is that all these … [Read more...]

Get Complete Application Control Management with CylancePROTECT and Privilege Manager

Thycotic customers are constantly requesting integrations with other products in their arsenal, especially other security products. Thycotic’s product team for Privilege Manager—our least privilege and application control product—is asked to work with CylancePROTECT® day after day. Our common customers are using both Thycotic and Cylance products on the endpoint to provide multiple layers of … [Read more...]

Seven Signs It’s Time to Move On from GPO-Only Privilege Management

Many organizations gravitate towards Group Policy Objects (GPO) for privilege management because it offers enough functionality to get started managing privileges. Yet, as your needs evolve, you may find that you require a privilege management system better suited to a maturing, sophisticated organization. What are some of the warning signs that you need more than GPO alone can provide? What … [Read more...]

Complex Cyber Security Tools Aren’t Just Painful, They are Downright Dangerous

Securing your company is a big job. People are counting on you to stay one step ahead of cyber criminals and keep them safe. But, when the cyber security tools you rely on are too cumbersome to use, you can’t get your job done. We believe cyber solution providers have a responsibility to make your life as easy as possible. That means giving you everything you need to get started right away. And, … [Read more...]

Everything you need to know about NIST 800-53

The National Institute of Standards and Technology (simply referred to as NIST) sets the security standards, guidelines and recommended security controls for the Federal Information Systems and Organizations.  This extensive database of publications includes the FIPS (Federal Information Processing Standards), SP (NIST Special Publications), NISTIR (NIST Internal Reports) and the ITL Bulletin … [Read more...]

Why is least privilege the place to start for endpoint security?

Because it will save you time and money.   Your end user’s computers are increasingly exploited as an attack vector used to attain accounts with local administrator rights on Windows or root access on Mac OS. There are a lot of solutions that promise malware detection and prevention. And you can buy more and more software to try to prevent these things from happening on the front lines. But … [Read more...]