POODLE: Not your typical walk in the park
Google, among several security organizations, recently announced a vulnerability in the SSL protocol, particularly SSL version 3. SSL is used to secure connections between a client and server to...
View ArticlePredicting Potential Threat: Behavior Analytics & Threat Modeling
Wouldn’t it be nice to be able to identify a potential threat before it happens? Learn how Secret Server uses threat modeling and behavioral analytics to discover and take immediate action on a threat,...
View ArticleQualys Security Conference 2014: Tension Between Security and IT Operations
In my previous post, ‘Vulnerability Scanning: Is Unauthenticated Scanning Enough?’ I discussed the differences between authenticated and unauthenticated scans, and how Qualys and Thycotic work together...
View ArticlePRIVILEGED USERS AND DATA BREACHES: A MATCH MADE IN HEAVEN?
With data breaches on the rise, more evidence is constantly being discovered to support the link between privileged accounts in organizations and network breaches. Thycotic and IANS recently conducted...
View ArticleWhen the Trusted Go Rogue, and How They (almost) Got Away With It
Jason Cornish, a former IT admin, successfully took down 88 servers of a major pharmaceutical corporation for the comfort of a fast food joint. The breach cost the company over $800,000 and caused the...
View ArticleFind out what’s new in Thycotic Secret Server 8.8! (Hint, it’s got some...
Thycotic Secret Server 8.8 is coming out later this month. Check out some of its new features. HSM INTEGRATON FOR ADDED SECURITY Are you a user of a hardware security module (HSM) who wishes you could...
View Article5 Reasons Why You Should Attend Thycotic’s UNLOCKED Conference
We’re excited to announce our first user conference on Sunday, May 3, 2015, in Chicago! The one-day conference includes opportunities to connect one-to-one with Thycotic experts and your peers. Attend...
View ArticleUniversities under Attack—Securing student, faculty, and staff’s personal...
Understanding the Size of the Education Industry Sometimes, businesses find out about a data breach the hard way – this was the case for Butler University in May 2013. Police investigating a case of...
View ArticleLarge Organization Employee Threat Assessment
Despite the popular image of the hacker cracking distant servers from his basement, studies show that people with legitimate access to your information pose an even bigger threat. And when information...
View ArticleNew HSM Integration: Secret Server and Thales e-Security
Secret Server 8.8 includes Thales integration and support for their Hardware Security Module (HSM). The Thales integration brings an additional layer of protection to Secret Server by controlling the...
View ArticleUp, up and away: How Distributed Engine technology helps Thycotic scale...
Why Distributed Engine? When you run Discovery, Password Changing, or Heartbeat in Thycotic Secret Server, all the work is queued up inside the web application. This requires no additional...
View ArticleHow to secure your privileged credentials
In this video blog series, IT security experts explain why compromised privileged credentials are at the heart of most large-scale cyber-attacks, and how privileged account management can help IT teams...
View ArticlePAM Security Blog Series Part 4: 3 Privileged Account Management Security...
In this video blog series, IT security experts explain why compromised privileged credentials are at the heart of most large-scale cyber-attacks, and how privileged account management can help IT teams...
View ArticleWhat’s New in Secret Server 8.9?
Secret Server 8.9 looks to answer a few important discussion points that have been around the application for a while now. First, a popular customer request – more granularity of permissions. Next,...
View ArticlePAM Security Blog Series Part 5: Tips for Implementing Privileged Account...
In this video blog series, IT security experts explain why compromised privileged credentials are at the heart of most large-scale cyber-attacks, and how privileged account management can help IT teams...
View Article5 Reasons Why You Should Attend Thycotic’s UNLOCKED Conference 2016
You asked and we listened! Thycotic’s UNLOCKED user conference is back, this time with 2 days packed with training, labs, and networking opportunities in our nation’s capital. Whether you’re an IT...
View ArticleNew Enterprise Ticketing System Integrations Available for BMC Software and...
The ability to automatically respond to and track Secret Server privileged user activity in enterprise ticketing systems is a huge benefit for our customers, because it removes the manual burden of...
View ArticleTo the moon! Announcing record-setting Q3 revenue and customer growth
We are on our way to finishing an extremely strong 2015 as we eagerly announce our Q3 revenue and customer growth to the world today. The Thycotic team has been working diligently around the clock to...
View ArticleGo from Last to First: Why Thycotic is the #1 Password Management Tool chosen...
It’s no surprise that passwords are the number one target for attackers to achieve success during any data breach. Password management has been a major discussion for IT professionals for years, and as...
View ArticleWhy Authenticated Scanning Matters, and How To Do It Right
Earlier this month, a few of us from Thycotic attended the Qualys Security Conference (QSC) and had the opportunity to speak at one of their spotlight sessions regarding authenticated scanning and how...
View Article