Alpha Generation Distribution Ltd is a 4SEC Group Company
Follow us on Twitter Follow us on LinkedIn
Call us on: 01777 852222

Browsing Category "Thycotic"

BlackHat 2017 Report: What has Changed

Published:

Black Hat Report 2017: What has Changed?

Thycotic’s annual Black Hat Survey Report captures the opinions of hackers at the Black Hat Conference. Celebrating its 20th anniversary this year, the event is a hub for security experts and hackers – and a valuable source of intelligence on today’s biggest threats and how businesses can defend themselves.


5 Privileged Account Management Tips from your Attackers

Published:

5 Privileged Account Management Tips from your Attackers

Who is your go-to source of advice on cyber security? Some of us turn to Google. Many of us keep up with the latest industry news. But there’s one group that knows more than anyone about the latest attacks and what makes an attacker’s life difficult: the attackers themselves.


Passwords Need Better Management, Not Replacement

Published:

Passwords Need Better Management, Not Replacement

What is the real impact of innovations like biometrics on the old-fashioned password? Are we really heading to a biometrics-led future and, if so, why should anyone be investing in better password and privileged account security now?


Wanna Cry Monitor

Published:

Ransomware – Don’t Become the Next Victim. #WannaCry

Ransomware has become a major threat and high risk to many individuals and organisations worldwide. It is a very destructive variant of malicious malware that impacts systems and makes critical files and sensitive information inaccessible until a ransom is paid.


Closing the Gaps in End-User IT Security

Published:

Closing the Gaps in End-User IT Security

As an IT security reseller, you do much more than take a portfolio of products to your customers. You’re a source of expertise – a trusted advisor who understands the challenges businesses face and the best strategies to overcome them.


How Four Eyes Fits with Cyber Security

Published:

How Four Eyes Fits with Cyber Security

In Privileged Account Management, your goal is to allow administrative access wherever it is required, without losing your overall governance and visibility. And the four eyes principle is, with the right technology, the perfect fit.


What GDPR Means For You Post-Brexit

Published:

What GDPR Means For You Post-Brexit

As we move to our EU exit, it’s tempting to wonder if one of the biggest challenges for IT security – the General Data Protection Regulation, or GDPR – has conveniently disappeared.


A PCI-Compliant Approach to Privileged Passwords

Published:

Privileged Passwords and PCI-Compliance

Network perimeter security is just one part of being PCI compliant. It also covers how to handle accounts and privileged passwords, and their auditability.

How does Thycotic fit in?