Thycotic Blog

Technical Product Updates and Industry Trends

  • POODLE: Not your typical walk in the park

    Google, among several security organizations, recently announced a vulnerability in the SSL protocol, particularly SSL version 3. SSL is used to secure connections between a client and server to prevent eavesdropping, and that the data has not been tampered. SSLv3 is an old version of the SSL protocol, dating back to 1996 and debuted with Netscape

    Read more →
  • Vulnerability Scanning: Is Unauthenticated Scanning Enough?

    Thousands of IT organizations across the world use vulnerability scanners to perform unauthenticated scans and find threats within their network. These scans find basic weaknesses and detect issues within operating systems, open network ports, services listening on open ports, and data leaked by services. This gives companies the ability to see their network from the

    Read more →
  • [VIDEO] What You Need to Know About Bash Bug

    We’ve all heard the headlines of the most recent security bug, including, ‘Shellshock bug could threaten millions compared to Heartbleed,’ or even more terrifying, ‘Shellshock: A deadly new vulnerability that could lay waste to the internet.’ While these headlines are a bit dramatic, there lies some truth in the statements. The National Institute for Standards

    Read more →
  • Why we surveyed a bunch of hackers

    At this year’s Black Hat USA, we conducted a survey of 127 self-identified “black hat” hackers. Why’d we do it? Because it’s not every day that you can get an insider perspective on the thought process and motivation behind today’s black hat hacker. Black Hat vs White Hat vs Awesome Programmers We have to caveat

    Read more →
  • (Video) Are You Following Password Best Practices?

    As an IT professional you juggle over 100 tasks a day, making sure everyone’s computers are up and running, no disasters are occurring, all while maintaining your entire network’s security. All of your daily responsibilities revolve around passwords and as an administrator you and your team are the keepers of ‘the keys to the kingdom.’

    Read more →
  • What is a smart grid and why should I care about it?

    In the United States, we depend on the electrical grid to power our homes, our businesses, and several leisurely pastimes (late-night soccer, anyone?). Today, that grid is “smart,” which is a catchy way of saying it uses modern technology for operation and automation, a technology trendseen in everything from consumer gadgets to datacenters. Just as

    Read more →