Cyber Security Hot Topics
Election Protection: How Cyber Criminals Could Steal Your Vote
How much should we worry about the security of the upcoming US presidential election? Could a hacker or nation-state actor influence the result? Well, there’s good news and there’s bad news for ...
Cyber Security and the Future of Connected Devices
Before I take you on a journey to the future of connected devices, let’s briefly reflect on how we got where we are today. During my career, I’m fortunate to have been ...
Protect Yourself at Work and Home to Avoid Becoming a Victim of Cyber Crime
Cybersecurity is no longer simply a technology challenge. It’s a challenge for everyone who interacts with technology. The protection of work and personal life are no longer separated. They’ve become intertwined thanks ...
How do you make cyber security tech buying decisions? Here’s what your peers say.
Commissioned by Thycotic, a research survey was conducted among more than 900 CISOs/Senior IT decision-makers across nine countries in August 2020. The report of survey results takes a close look at how ...
National Cyber Security Awareness Month: If you connect it, protect it
Can you spot the red flags of a cyber crime? What behaviors do cyber criminals love to abuse? Here’s how to avoid being the next victim! Cyber security is no longer just ...
The Impact of the California Consumer Privacy Act on Privileged Access Management
Consumers are demanding greater control and security over the collection and processing of their personal data. A bevy of privacy laws are rolling out across the world and multiple U.S. states, driving ...
Thycotic shifts the language used in products and materials to promote inclusivity
This moment in 2020 is a flashpoint in time. We hear calls for a number of changes to address the current political and cultural climate. As a security software company, our engineers ...
Privileged Access Management for Industrial IoT
The convergence of operational technology (OT) and information technology (IT) has propelled “Industry 4.0” into the spotlight as the next wave of the industrial revolution. The Industrial Internet of Things (IIoT) brings ...
The Twitter Hack and the Failure to Protect Privileged Access
Twitter. The biggest social media hack so far, and it could have been much, much worse! We all should be very worried. Could a tweet start a war, change the outcome of ...
IAM: The Future of Identities and How We’ll Get There
Identity and Access Management (IAM) is the ability to provision, manage, audit and secure digital identities to facilitate and enable approved, authentic requests or connections to view company data, services, systems, networks, ...

