The CISO Research Report: CISOs thrive on being Guardians of the Business and maybe even the Galaxy

Is Data the new Oil? Some people maintain that “Data is the new oil”. Tech companies around the world are now ranking among the largest global companies. A number of them have values that exceed some countries’ GDP.  Tesla, some would… Continue reading The CISO Research Report: CISOs thrive on being Guardians of the Business and maybe even the Galaxy

Why are security and business goals at odds with each other?

Few jobs are more challenging than that of a CISO. Constantly on call and under intense pressure, they’re not only keeping critical systems running and sensitive data protected, but also working to uphold a rapidly evolving list of regulatory demands. … Continue reading Why are security and business goals at odds with each other?

Thycotic’s Cyber Security Predictions and Trends for 2020

Which cyber security predictions or trends do you think will become reality? 2019 has been an exciting and interesting year for those of us with an interest in cyber security.  The topic is top of mind for governments and business leaders around the wo… Continue reading Thycotic’s Cyber Security Predictions and Trends for 2020

The Evolution from Password Managers to Privileged Access Management. Which is right for you?

In recent years the need for improved Identity and Access Management (IAM) has been growing. Businesses are enabling policies and technologies to authorize approved employees and 3rd party contractors’ access to the systems and applications required to… Continue reading The Evolution from Password Managers to Privileged Access Management. Which is right for you?

The 7 Deadly Privileged Accounts You MUST Discover, Manage and Secure

Privileged accounts and privileged access are at the heart of every business today. They ensure that the IT team can administer and manage the organization’s systems, infrastructure, and software, and they enable employees to access the data that… Continue reading The 7 Deadly Privileged Accounts You MUST Discover, Manage and Secure

Cyber Security Incident Response and Reporting Process

Ever since we launched our customizable cyber security incident response template, I’ve been amazed by its volume of downloads. I quickly realized that the increasing cyber threats from criminal hackers, malware and ransomware is starting to be t… Continue reading Cyber Security Incident Response and Reporting Process

How the just-released Forrester Wave PIM Q4 2018 Report can help you find the right PAM vendor

As awareness about the importance of Privileged Access Management (PAM) and Privileged Identity Management (PIM) increases, (Gartner called it a top priority for cyber security in 2019), executives, IT security and operations teams are evaluating multi… Continue reading How the just-released Forrester Wave PIM Q4 2018 Report can help you find the right PAM vendor

How to kick start your least privilege strategy as we begin 2019

As we open 2019, we are expecting the issue of least privilege cybersecurity to become a priority for companies across the spectrum. One of the big reasons, of course, is that 80 percent of breaches today involve the compromise of IT and business user … Continue reading How to kick start your least privilege strategy as we begin 2019