Cyber criminals don’t want to be found—a Privilege Detective using Thycotic’s free Least Privilege Discovery Tool

Cyber criminals don’t want to be found—a Privilege Detective using Thycotic’s free Least Privilege Discovery Tool

| | How To & Guides
Cyber criminals don’t want to be found. They play a great game of hide and seek, and in many companies—no one is doing any seeking. Instead, they hope that their security perimeter is holding strong, typically relying on traditional cyber security controls that are usually outdated and, for most cyber ... Read More
🙂

The EU GDPR is now in effect. What has happened so far?

Finally, the time has come. May 25th 2018 is now in the past, and the EU GDPR has come into effect after a two-year transition period. The earth is still rotating, the internet still kind of works. So what has happened, and have any lessons been learned yet? EU GDPR ... Read More
The NIST 800-53 is broken into the minimum security controls IMPACT baseline.

Everything you need to know about NIST 800-53

The National Institute of Standards and Technology (simply referred to as NIST) sets the security standards, guidelines and recommended security controls for the Federal Information Systems and Organizations. This extensive database of publications includes the FIPS (Federal Information Processing Standards), SP (NIST Special Publications), NISTIR (NIST Internal Reports) and the ... Read More
Why is privileged account management the number one project according to Gartner?

Gartner: Privileged Access Management is the #1 Cyber Security Priority for 2018

A recent report from Gartner reveals the top IT Security Projects for 2018 with Privileged Access Management as #1, Application Control #4 and Protecting Endpoints #6. Before we get into why Privileged Access Management (PAM) is the #1 Cyber Security Priority in 2018, let’s take a quick look at what ... Read More
Thycotic will be at stand F285 at InfoSecurity Europe in London, June 5 - 7

Infosecurity Europe kicks off in London on June 5. Here’s how you’ll get the most out of it

It’s the beginning of June and that means one thing in the cyber security professional’s calendar: Infosecurity Europe is here. Infosecurity Europe is one of the largest cyber security events in Europe with over 400 exhibitors gathering to show off the latest in cyber security defense (and also some offensive ... Read More
Complexity kills. Simplicity succeeds: Why Thycotic beats CyberArk in new vendor evaluation

Complexity kills. Simplicity succeeds: Why Thycotic beats CyberArk in new vendor evaluation

| | Uncategorized
A new vendor evaluation analyst report from the UK-based Cyber Management Alliance, puts Thycotic’s Privileged Access Management solution—Secret Server—at the top of its Leaderboard, ahead of the traditional 800-pound gorilla in the PAM space, CyberArk. Based on an extensive evaluation list of criteria, the CM-Alliance makes very clear why Thycotic ... Read More
Download the 2018 Global State of Privileged Access Management Risk and Compliance Report

2018 Global State of Privileged Access Management Risk and Compliance: Part 1

Most companies are FALLING SHORT on compliance when it comes to privileged accounts! Thycotic’s research shows Privileged Access Management is a Top Risk and Compliance requirement, yet it’s significantly failing to be fully implemented meaning that most companies fall short on compliance for privileged access. The majority of organizations begin ... Read More
SC Cable Car News Pt. 2

RSA Conference 2018: A secure internet starts with YOU, and it’s everyone’s responsibility

It was another quiet morning, though this might have been because it was around 5am in the morning and I was still struggling to adjust to the time zone change from Tallinn, Estonia to San Francisco—a measly 10 hours. I knew the days that lay ahead would be interesting but ... Read More
Symantec Internet Security Threat Report 2018: The Top Takeaways

Symantec Internet Security Threat Report 2018: The Top Takeaways

It has been a very interesting past year with a few surprises along the way, but as expected cyber-crime grew significantly; financial impact was huge and many companies struggled to recover from cyber-attacks. Cyber security—or the lack of it—is rapidly impacting everyone’s daily life and there is no longer a ... Read More
Key takeaways from the 2018 Verizon Data Breach Investigations Report

Key takeaways from the 2018 Verizon Data Breach Investigations Report

The latest installment of the Verizon Data Breach Investigations Report 2018 is now available. It’s the 11th edition of the report, and not surprisingly, it reveals that hackers have continued to be very successful at using their hacking techniques (many which are well known) and we have failed to stop ... Read More
Loading...