Election Protection: How Cyber Criminals Could Steal Your Vote

Election Protection: How Cyber Criminals Could Steal Your Vote

How much should we worry about the security of the upcoming US presidential election? Could a hacker or nation-state actor influence the result? Well, there’s good news and there’s bad news for ...
Virtual Reality. A Collision of Worlds | Joseph Carson | TEDxTTU

Cyber Security and the Future of Connected Devices

Before I take you on a journey to the future of connected devices, let’s briefly reflect on how we got where we are today. During my career, I’m fortunate to have been ...
Protect Yourself at Work and Home to Avoid Becoming a Victim of Cyber Crime

Protect Yourself at Work and Home to Avoid Becoming a Victim of Cyber Crime

Cybersecurity is no longer simply a technology challenge. It’s a challenge for everyone who interacts with technology. The protection of work and personal life are no longer separated. They’ve become intertwined thanks ...
Persuading Boards to Invest by Country

How do you make cyber security tech buying decisions? Here’s what your peers say.

Commissioned by Thycotic, a research survey was conducted among more than 900 CISOs/Senior IT decision-makers across nine countries in August 2020. The report of survey results takes a close look at how ...
You Should Probably Change Your Password! | Michael McIntyre Netflix Special

National Cyber Security Awareness Month: If you connect it, protect it

Can you spot the red flags of a cyber crime? What behaviors do cyber criminals love to abuse? Here’s how to avoid being the next victim! Cyber security is no longer just ...
The Impact of the California Consumer Privacy Act on Privileged Access Management

The Impact of the California Consumer Privacy Act on Privileged Access Management

Consumers are demanding greater control and security over the collection and processing of their personal data. A bevy of privacy laws are rolling out across the world and multiple U.S. states, driving ...
Thycotic shifts the language used in products and materials to promote inclusivity

Thycotic shifts the language used in products and materials to promote inclusivity

This moment in 2020 is a flashpoint in time. We hear calls for a number of changes to address the current political and cultural climate.  As a security software company, our engineers ...
dotmagazine meets... Joseph Carson: Understanding IoT from a Security Perspective

Privileged Access Management for Industrial IoT

The convergence of operational technology (OT) and information technology (IT) has propelled “Industry 4.0” into the spotlight as the next wave of the industrial revolution. The Industrial Internet of Things (IIoT) brings ...
Response to Twitter Incident

The Twitter Hack and the Failure to Protect Privileged Access

Twitter. The biggest social media hack so far, and it could have been much, much worse! We all should be very worried. Could a tweet start a war, change the outcome of ...
dotmagazine meets... Joseph Carson: Understanding IoT from a Security Perspective

IAM: The Future of Identities and How We’ll Get There

Identity and Access Management (IAM) is the ability to provision, manage, audit and secure digital identities to facilitate and enable approved, authentic requests or connections to view company data, services, systems, networks, ...