Thycotic stories - Page 2
Thycotic debunks top Privileged Access Management myths
Privileged Access encompasses access to computers, networks and network devices, software applications, digital documents and other digital assets.
85% of organisations struggling with access management – Thycotic
Thycotic's report reveals dire PAM practices with 85% of firms at initial phase.
IT security teams suffering an 'image problem'
Security professionals feel like they are perceived as ‘policemen’, and 13% say they experience negativity from colleagues all the time.
Quora's been breached: Users, change your passwords
Quora’s 100 million users are the latest targets in a major data breach, but at least the company has moved quickly to contain it.
Thycotic’s cloud-based PAM offering now has full capabilities
Thycotic has upgraded its privileged account management-as-a-service offering with all of the features of the on-premise version.
Breaking down the ASD’s “top four” strategies to mitigate cybersecurity incidents
We take a deep dive into the absolute essential aspects of a robust security strategy, as outlined by the Australian government.
70% of firms would fail a privileged account management audit
Firms believe privileged account management is important for security - but why are they still doing it wrong?.
Hackers speak: Privileged accounts best way to steal data
From the mouths of the hackers themselves, organisations’ privileged accounts are the most attractive targets for gaining access to critical data.
Exclusive: Emt Distribution eyes aggressive growth for Kiwi business
Emt Distribution is expecting high demand from Kiwi resellers for its latest vendor signing after setting its sights on 60% growth for its NZ business.
emt Distribution inks deal for Thycotic enterprise password management solution
emt Distribution has ramped up its local operations after signing a master distribution deal with US priviliged account management vendor Thycotic.
Tenable Network Security meets its match
The logistical details of conducting credentialed network vulnerability assessments aren't all that straight forward. Enter Thycotic.