Cyentia Cybersecurity Research Library
  • Sources
  • Tags
  • About
  • Return to Cyentia.com

thycotic

Below you will find reports with the source of “thycotic”

image from Cyber Security Team's Guide to Technology Decision Making

Cyber Security Team's Guide to Technology Decision Making

This report was created after a survey of more than 900 Senior IT security decision-makers. It looks at how they allocate finite resources in a way that best serves their organization. (more available)
Added: December 18, 2020
image from Cybersecurity Team's Guide: Technology Decision Making

Cybersecurity Team's Guide: Technology Decision Making

This report is based off an August 2020 survey, in order to better understand how companies should allocate finite resources, how decisions on cybersecurity are made, and more. (more available)
Added: October 14, 2020
image from 2020 Global State of Least Privilege Cyber Security

2020 Global State of Least Privilege Cyber Security

Applying the principle of least privilege should be a foundational element of any organization’s cyber security strategy. However, a sustainable least privilege strategy isn’t something that can be set up overnight. (more available)
Added: May 8, 2020
© Cyentia Institute 2021
Library updated: March 9, 2021 04:05 UTC (build 7e736b2)