Screenshot: macOS Catalina KEXT Warning Dialog

How to Protect Your macOS Endpoints with Shift from KEXT to SYSEX

Cue music: Ch-Ch-Cha-Changes In recent macOS releases, Apple has been drawing attention to third-party software that uses technology like kernel extensions and system extensions. This technology allows users to install components or ...
9 Cloud Security Best Practices Your Organization Should Follow

9 Cloud Security Best Practices Your Organization Should Follow

Transitioning to the cloud is one of the most significant technology shifts your company will face. Last year, over 80% of organizations operating in the cloud experienced at least one compromised account ...
Every system is a privileged system: Incorporating Unix/Linux in your privilege management strategy

Every system is a privileged system: Incorporating Unix/Linux in your privilege management strategy

Lately we’ve been banging the drum that “every user is a privileged user,” meaning privileged users aren’t limited to system administrators but also include business users with access to applications and endpoints ...
How to Expedite Discovery of Service Accounts for Onboarding into Service Account Governance

How to Expedite Discovery of Service Accounts for Onboarding into Service Account Governance

Service accounts, by their nature, can take on a life of their own. They’re rarely tied to a human owner if managed at all, so service account sprawl takes over and organizations’ ...

Remote Worker Security: The Risks, Challenges, and Solutions

The concept of working remotely, or granting remote access, isn’t anything new for most IT professionals. Most organizations have embraced a remote workforce, be it their own employees, contractors, consumers, business partners, ...
Protect Yourself at Work and Home to Avoid Becoming a Victim of Cyber Crime

Protect Yourself at Work and Home to Avoid Becoming a Victim of Cyber Crime

Cybersecurity is no longer simply a technology challenge. It’s a challenge for everyone who interacts with technology. The protection of work and personal life are no longer separated. They’ve become intertwined thanks ...
Persuading Boards to Invest by Country

How do you make cyber security tech buying decisions? Here’s what your peers say.

Commissioned by Thycotic, a research survey was conducted among more than 900 CISOs/Senior IT decision-makers across nine countries in August 2020. The report of survey results takes a close look at how ...
You Should Probably Change Your Password! | Michael McIntyre Netflix Special

National Cyber Security Awareness Month: If you connect it, protect it

Can you spot the red flags of a cyber crime? What behaviors do cyber criminals love to abuse? Here’s how to avoid being the next victim! Cyber security is no longer just ...
Cloud Services and Business Applications in the Enterprise

Bring to Light the Security Risks of Web Applications run by Shadow IT

A quiet proliferation of SaaS and web applications and infrastructure with web-based interfaces is taking place throughout your organization. These applications are often essential to business, financial, and technical users. Yet, security ...
Role-Based Access Control for a Complex Enterprise

Role-Based Access Control for a Complex Enterprise

What is role-based access control (RBAC)? Role-based access control, or RBAC, is the antidote to piecemeal user and permission management. RBAC provides a mechanism for system administrators to set policies and apply ...