Thycotic Blog

Technical Product Updates and Industry Trends

  • 5 things you can’t miss at Gartner Identity & Access Management Summit 2014

    You may be thinking of warm pumpkin pie, football and turkey induced comas as Thanksgiving quickly approaches, but just as the holiday season kicks off, so does Gartner’s Identity and Access Management Summit in Las Vegas on December 1st. We have a lot planned at Gartner IAM and there are many ways you can connect

    Read more →
  • What’s New in Password Reset Server 4.0?

    Password Reset Server 4.0 is out, and it has new features to make your installation simple and easy to use. What will be your favorite new feature? HSTS HTTP Strict Transport Security, when turned on, means that Password Reset Server can only be accessed using HTTPS. It is important to access sites that send or receive

    Read more →
  • Qualys Security Conference 2014: Tension Between Security and IT Operations

    In my previous post, ‘Vulnerability Scanning: Is Unauthenticated Scanning Enough?’ I discussed the differences between authenticated and unauthenticated scans, and how Qualys and Thycotic work together to find vulnerabilities for better security. When performing authenticated scans, Qualys uses credentials to find sensitive issues such as malware, patches, incorrect configuration, and other vulnerabilities. It then scans

    Read more →
  • Access Control: Models and Methods

    By: Stuart Gentry, an InfoSec Institute contributor and computer security enthusiast/researcher. There are times when people need access to information, such as documents, slides, etc., on a network drive but don’t have the appropriate level of access to read and/or modify the item. This can happen at the most inconvenient time and they would need

    Read more →
  • Haunting Tale: Beware of the Insider

    We all love October for the fall nights, changing leaves, hot cider and Halloween festivities. October is also National Cyber Security Awareness Month suported by the National Cyber Security Alliance. Although we preach cyber security best practices all year, it’s an important reminder to stay safe online. In support of National Cyber Security Awareness Month

    Read more →
  • Predicting Potential Threat: Behavior Analytics & Threat Modeling

    Wouldn’t it be nice to be able to identify a potential threat before it happens? Learn how Secret Server uses threat modeling and behavioral analytics to discover and take immediate action on a threat, stopping an attacker in their tracks. Threat Modeling The term “threat modeling” has become quite popular lately as an upcoming major

    Read more →