Phone Number +1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Author Articles

Give Your Cyber Security Career a Boost

August 3rd, 2021

While the shortage of qualified cyber security professionals continues to grow exponentially and ransomware attacks grab international headlines, many mid-career IT professionals with cyber security job experience are evaluating their options. Maybe a year of working remotely has given you pause to think about your career goals and take some time to learn new skills.…


Black Hat USA 2021 – Top 5 Sessions to Attend & Tips to Survive Now that Conferences are Back In-Person

July 29th, 2021

It is that time of the year again—hacker summer camp is back! In 2020, the global pandemic dramatically changed our social environment, and both Black Hat and Defcon went virtual with in-person networking and parties placed on hold. This year, both events are back with a hybrid flavor to them. Black Hat USA, Saturday, July…


Cyber Security Wakeup Call: New Global Research Shows Remote Workers Face Tough Choices Between Productivity and Security

July 27th, 2021

ThycoticCentrify just completed a global cyber security survey among 8,000+ knowledge workers in 15 countries in partnership with Sapio Research. Survey results reveal a disturbing (if not surprising) disconnect between an understanding of cyber security risks in 2021 and the risky activities employees engage in every day to get their jobs done. This new survey…


3 Top Takeaways from the 2021 Verizon Data Breach Investigations Report

June 29th, 2021

The 2021 Verizon Data Breach Investigations Report (DBIR) is here with the latest news and trends on the past year’s data breaches and security incidents. The Verizon DBIR is one of the industry’s top reports providing us with an indication of how well, or how poorly, our security efforts are performing, as well as giving…


Layered Privilege Security with Secret Server and Privilege Manager

June 22nd, 2021

Nearly all major data breaches involve both compromised endpoints and compromised privileged credentials. You must address both of these attack vectors in a layered security strategy to effectively lower your risk of a cyber attack. Layered security combines different security solutions into a coordinated, comprehensive strategy, the whole of which is greater than the sum…


Cyber Incident Response Checklist and Plan: Are You Breach-Ready?

May 27th, 2021

It’s no longer rare to see cyber-attacks in the daily news. From ransomware to data breaches to DDoS (Distributed Denial of Service) attacks, the incident is usually attributed to either cyber criminals or nation-states, and almost always comes from beyond our own country’s borders and laws. Because of this, we worry about clicking on a…


New Ransomware Model Presumes Honor Among Thieves

May 20th, 2021

Ransomware is now big business, part of a production line of organized cyber crime. Thanks to ransomware’s new “affiliate” model, not only are attacks increasing in frequency, but they’re also becoming more sophisticated, successful, and damaging. This new affiliate model is also known as Ransomware-as-a-Service Ransomware attacks have victimized multiple organizations including TV stations, airplane…


Cyber Security Incident Reporting Process and Template

May 6th, 2021

Ever since we launched our customizable cyber security incident report template, I’ve been amazed by its volume of downloads. I quickly realized that the increasing cyber threats from criminal hackers, malware, and ransomware being taken seriously by organizations large and small, and that there is a growing demand for guidance and information on cyber security…


The New Cyber Security “Perimeter”: Securing Privileged Access

April 22nd, 2021

Because so many applications and services are now hosted in the cloud, the traditional cyber security perimeter no longer exists. Accelerated by the COVID global pandemic, remote access from multiple devices has become the rule rather than the exception across our networks. In our always-on, Internet-connected universe, every user potentially has access to privileged or…


Securing and Hardening Linux and Unix Endpoints Against Cyber Attack: Part IV

March 30th, 2021

This post is part of a series on securing your endpoints against cyber attacks. Read: Part I | Part II | Part III | Part IV How Secure are your Linux Endpoints? An Ethical Hacker’s Guide to Securing and Hardening Linux and Unix Endpoints Welcome to the next post in our series on hardening and…