Thycotic Blog

Technical Product Updates and Industry Trends

  • Unlock the Secrets of Secret Server at UNLOCKED Conference

    Do you love Secret Server as much as we do? If so, don’t miss your opportunity to join us for our first user conference, UNLOCKED, on Sunday, May 3rd. This is your chance to connect with other Secret Server power users and our privileged account management experts. I’ll let you in on a little secret-

    Read more →
  • New HSM Integration: Secret Server and Thales e-Security

    Secret Server 8.8 includes Thales integration and support for their Hardware Security Module (HSM). The Thales integration brings an additional layer of protection to Secret Server by controlling the Secret Server encryption key within the HSM. What are HSMs? They are devices that manage and store the keys used to encrypt and decrypt data –

    Read more →
  • Don’t FREAK—A Zombie Security Flaw from the 90’s?

    Nearly a third of encrypted websites were vulnerable to yet another SSL-related security flaw – this one dubbed the “FREAK” vulnerability, standing for Factoring RSA Export Keys. The gist of the FREAK attack is that attackers can intercept traffic between client and server – traffic that is supposed to be encrypted with SSL or TLS.

    Read more →
  • The Top Three Ways Personally Identifiable Information is Leaked in Healthcare

    Personally identifiable information (PII) related to healthcare data is 50x more valuable on the black market than credit card data according to Alert Logic. Forty three percent of all identity thefts in the United States in 2013 were accounted to medical related identity theft (Logic, 2014). The healthcare industry knows they need to protect PII. It’s

    Read more →
  • Meet Our Customer Experts Presenting at UNLOCKED Conference

    Today we are excited to announce and introduce the Thycotic expert users leading our Birds of a Feather sessions and highly anticipated customer panel discussion at UNLOCKED conference, hosted by our founder and CEO, Jonathan Cogley. From higher education to real estate investment and legal services, our customer experts represent a wide variety of industry

    Read more →
  • Large Organization Employee Threat Assessment

    Despite the popular image of the hacker cracking distant servers from his basement, studies show that people with legitimate access to your information pose an even bigger threat. And when information is stolen from within, it’s often harder to trace and determine the extent of the problem. The larger your organization, the more is the

    Read more →