Complexity kills. Simplicity succeeds: Why Thycotic beats CyberArk in new vendor evaluation

Complexity kills. Simplicity succeeds: Why Thycotic beats CyberArk in new vendor evaluation

/ / Uncategorized
A new vendor evaluation analyst report from the UK-based Cyber Management Alliance, puts Thycotic’s Privileged Access Management solution—Secret Server—at the top of its Leaderboard, ahead of the traditional 800-pound gorilla in the PAM space, CyberArk. Based on an extensive evaluation list of criteria, the CM-Alliance makes very clear why Thycotic ... Read More
Download the 2018 Global State of Privileged Access Management Risk and Compliance Report

2018 Global State of Privileged Access Management Risk and Compliance: Part 1

Most companies are FALLING SHORT on compliance when it comes to privileged accounts! Thycotic’s research shows Privileged Access Management is a Top Risk and Compliance requirement, yet it’s significantly failing to be fully implemented meaning that most companies fall short on compliance for privileged access. The majority of organizations begin ... Read More
SC Cable Car News Pt. 2

RSA Conference 2018: A secure internet starts with YOU, and it’s everyone’s responsibility

It was another quiet morning, though this might have been because it was around 5am in the morning and I was still struggling to adjust to the time zone change from Tallinn, Estonia to San Francisco—a measly 10 hours. I knew the days that lay ahead would be interesting but ... Read More
Symantec Internet Security Threat Report 2018: The Top Takeaways

Symantec Internet Security Threat Report 2018: The Top Takeaways

It has been a very interesting past year with a few surprises along the way, but as expected cyber-crime grew significantly; financial impact was huge and many companies struggled to recover from cyber-attacks. Cyber security—or the lack of it—is rapidly impacting everyone’s daily life and there is no longer a ... Read More
Key takeaways from the 2018 Verizon Data Breach Investigations Report

Key takeaways from the 2018 Verizon Data Breach Investigations Report

The latest installment of the Verizon Data Breach Investigations Report 2018 is now available. It’s the 11th edition of the report, and not surprisingly, it reveals that hackers have continued to be very successful at using their hacking techniques (many which are well known) and we have failed to stop ... Read More
RSA 2018: Top 5 Sessions You Can’t Miss

RSA 2018: Top 5 Sessions You Can’t Miss

The USA 2018 RSA Conference is only a few weeks away and around 45,000 IT security professionals will be arriving in San Francisco to discuss one of the biggest risks and threats to our future, countries, economies and civilization. Yes, cyber security and how to prevent future cyber-wars will be ... Read More
Will Fake News Lead to the Next Cyber War?

Will Fake News Lead to the Next Cyber War?

Fake news is running rampant across all media outlets. While you may not take them seriously, these untrue news stories are playing with your emotions and have serious security implications. With over half the world’s population online and using social media, news travels fast. And sometimes the wrong news gets ... Read More
The EU GDPR Checklist: It’s go time!

The EU GDPR Checklist: It’s go time!

Yes, you’ve all heard about it. Many companies have been raising the alarm and increasing awareness about GDPR—General Data Protection Regulation—for months now, all offering solutions for anything at all to do with GDPR. It’s caused a lot of confusion, raised many questions—and organizations have no idea where to start ... Read More
New South Wales Government failure highlights critical nature of PAM

New South Wales Government failure highlights critical nature of PAM

The New South Wales Government’s cyber security strategy is under urgent review after Auditor’s Offices criticised the way its agencies are handling privileged access and other basic security practices. At the end of last year (20th December 2017) the government of New South Wales received an unwelcome Christmas present from ... Read More
Top 5 Ways to Win your CEO/CTOs Heart

Top 5 Ways to Win your CEO/CTOs Heart

In today’s always-connected world it’s important to realize that, historically and traditionally, cybersecurity was the responsibility of the IT department. Any time a cyber incident or data breach occurred or security questions arose, these got deferred to IT for the answers. Failure to translate cyber risk into business risk has ... Read More
Loading...