Thycotic Blog

Technical Product Updates and Industry Trends

  • 5 Reasons Why You Should Attend Thycotic’s UNLOCKED Conference

    We’re excited to announce our first user conference on Sunday, May 3, 2015, in Chicago! The one-day conference includes opportunities to connect one-to-one with Thycotic experts and your peers. Attend technical deep dive sessions to learn security best practices and build your 2015 password management plan. Here are the top 5 reasons you should attend

    Read more →
  • Find out what’s new in Thycotic Secret Server 8.8! (Hint, it’s got some pretty cool new security features)

    Thycotic Secret Server 8.8 is coming out later this month. Check out some of its new features. HSM INTEGRATON FOR ADDED SECURITY Are you a user of a hardware security module (HSM) who wishes you could integrate it with Secret Server to protect your encryption.config file? It’s your lucky day, because Secret Server 8.8 supports

    Read more →
  • Thycotic named finalist in Best Customer Service category, SC Magazine Awards 2015

    Today we are thrilled to announce our selection as a finalist in the 2015 SC Magazine Awards in the “Best Customer Service” category. In its 18th year, the SC Magazine Awards showcase the top security technologies, services and professionals in information technology. A new category this year, vendors recognized for The Best Customer Service award

    Read more →
  • The First Line of Defense – Passwords

    The IT security stakes are high for the healthcare industry – HIPAA violations and fines, criminal charges, and tainted brand reputations make up the fates of healthcare organizations that fail to protect patient data both from the inside and out. Why Healthcare is Being Targeted A large number of personally identifiable information (PII) is stored

    Read more →
  • 2014 Review: Light Speed Ahead

    With more than 3,000 customers and 180,000 users, Thycotic had the most accelerated year of growth yet. Information security professionals worldwide would agree that 2014 was the “year of the data breach”. Several recognizable brands were successfully attacked by malicious insiders and cybercriminals, skyrocketing the need for security tools to an all-time high. No business

    Read more →
  • Lessons from the Sony Hack: Prioritize Privileged Account Management

    CNN recently reveled the methodology of the cyber attack that allowed anonymous cybercriminals Guardians of Peace direct access to their network, or the “keys to the entire building,” as one Sony Pictures Entertainment official stated. According to investigators, the attack was carried out through a set of stolen system administrator credentials; a privileged account username and

    Read more →