20% have never changed their default passwords for privileged accounts

Back to the Basics: Service Account Management 101

Service accounts don’t have to be a nightmare. Get in control now. Service accounts are typically used in operating systems to execute applications or run programs, either in the context of system accounts (high privileged accounts without any password) or a specific user account, usually created manually or during software ... Read More
Enable compliance and in-depth vulnerability assessments with Tenable

Thycotic’s Strategic Alliance program means Privileged Access Management Security for everyone

Privileged Access Management is an important and vital security solution that helps protect one of the most important assets in an organization. Software vendors can simply enable and empower their solutions by integrating into the world’s most popular, friendly, easy-to-use and most valuable Privileged Access Management solution available. Organizations and ... Read More
Black Hat Conference 2018

The Black Hat 2018 Hacker Survey Report and Recap by Thycotic

| | Cyber Security, events
Another Black Hat conference has come and gone and more than 17,000 international security professionals converged on Las Vegas, USA to learn, share, educate and disclose security research on the latest cyber threats, attacks, vulnerabilities and techniques used to bypass the security employed by most governments and organizations globally. Of ... Read More
BUY, BUY, BUY, BUY is sometimes not the answer!

BUY, BUY, BUY, BUY is sometimes not the answer!

| | Uncategorized
Strategy, vision, and innovation. These are the key ingredients to creating software that’s good for people and business. Bomgar is desperately wanting to enter the growing Privileged Access Management (PAM) market. Originally, Bomgar started as a Secure Remote Desktop and Remote Support company in a market crowded with free and ... Read More
Incident Response: Are You Breach-Ready?

Incident Response: Are You Breach-Ready?

It’s no longer rare to see cyber-attacks in the daily news. From ransomware to data breaches to DDoS (Distributed Denial of Service) attacks, the incident is usually attributed to either cyber criminals or nation states, and almost always comes from beyond our own country’s borders and laws. Because of this, ... Read More
Hacking the US Elections: How Government Agencies Can Protect Themselves

Hacking the US Elections: How Government Agencies Can Protect Themselves

The US midterm elections campaigns are well under way and expected to be held on Tuesday, November 6, 2018. This midterm election is significant as it will take place right in the middle of President Trump’s first term and will likely be an indicator of the US citizens’ confidence in ... Read More
Back to the Basics: The problem with forcing regular password expiry

Back to the Basics: The problem with forcing regular password expiry

For many people and organizations around the world a single password is sometimes the only security control protecting their sensitive information, access to email and even their bank account. The traditional password best practice was to create a long, complex password that only you would know, and it protected one ... Read More
Privileged Access Management Lifecycle

Back to the Basics: How do you define Privileged Access?

The Privileged Access Management Lifecycle and Path to Maturity Countless organizations are growing more and more concerned about the ever-evolving threat landscape of cyber-attacks, as they watch large well-known enterprise organizations falling victim to cyber-crime. Every year billions of records are stolen, identity theft increases, more credentials are abused and ... Read More
What happens when cyber attackers create a clone of you?

The 6 Most Disturbing Data Breaches In 2018 So Far

You could argue that all cyber-attacks and data breaches are disturbing, and you wouldn’t be wrong. But all too often a cyber-incident comes along that hits a whole new level of intrusion or includes an unsettling component of cyber security neglect that causes us to raise our eyebrows higher than ... Read More
Cyber criminals don’t want to be found—a Privilege Detective using Thycotic’s free Least Privilege Discovery Tool

Cyber criminals don’t want to be found—a Privilege Detective using Thycotic’s free Least Privilege Discovery Tool

| | How To & Guides
Cyber criminals don’t want to be found. They play a great game of hide and seek, and in many companies—no one is doing any seeking. Instead, they hope that their security perimeter is holding strong, typically relying on traditional cyber security controls that are usually outdated and, for most cyber ... Read More
Loading...