Thycotic will be closed Thursday and Friday, Nov. 26th and 27th for the Thanksgiving holiday. More info »

  • 03 MAR 15

The Top Three Ways Personally Identifiable Information is Leaked in Healthcare

Personally identifiable information (PII) related to healthcare data is 50x more valuable on the black market than credit card data according to Alert Logic. Forty three percent of all identity thefts in the United States in 2013 were accounted to medical related identity theft (Logic, 2014). The healthcare industry knows they need to protect PII. It’s

  • 17 FEB 15

Large Organization Employee Threat Assessment

Despite the popular image of the hacker cracking distant servers from his basement, studies show that people with legitimate access to your information pose an even bigger threat. And when information is stolen from within, it’s often harder to trace and determine the extent of the problem. The larger your organization, the more is the

  • 10 FEB 15

Universities under Attack—Securing student, faculty, and staff’s personal information

Understanding the Size of the Education Industry Sometimes, businesses find out about a data breach the hard way – this was the case for Butler University in May 2013. Police investigating a case of identity theft in California discovered a flash drive on one of their suspects that contained the personally identifiable information (PII) of

  • 23 DEC 14

Lessons from the Sony Hack: Prioritize Privileged Account Management

CNN recently reveled the methodology of the cyber attack that allowed anonymous cybercriminals Guardians of Peace direct access to their network, or the “keys to the entire building,” as one Sony Pictures Entertainment official stated. According to investigators, the attack was carried out through a set of stolen system administrator credentials; a privileged account username and

  • 16 DEC 14

3 Tips to Stay Safe Shopping this Holiday Season

The holidays are here, and so are many tempting sales from the nation’s largest retailers. Despite the recent trend of data breaches we have seen among consumer companies like Target and Home Depot, we doubt that will slow down 2014’s holiday shoppers. No matter where you shop, use these three tips to stay safe. Use

  • 11 NOV 14

Qualys Security Conference 2014: Tension Between Security and IT Operations

In my previous post, ‘Vulnerability Scanning: Is Unauthenticated Scanning Enough?’ I discussed the differences between authenticated and unauthenticated scans, and how Qualys and Thycotic work together to find vulnerabilities for better security. When performing authenticated scans, Qualys uses credentials to find sensitive issues such as malware, patches, incorrect configuration, and other vulnerabilities. It then scans

  • 28 OCT 14

Haunting Tale: Beware of the Insider

We all love October for the fall nights, changing leaves, hot cider and Halloween festivities. October is also National Cyber Security Awareness Month suported by the National Cyber Security Alliance. Although we preach cyber security best practices all year, it’s an important reminder to stay safe online. In support of National Cyber Security Awareness Month

  • 07 OCT 14

[VIDEO] What You Need to Know About Bash Bug

We’ve all heard the headlines of the most recent security bug, including, ‘Shellshock bug could threaten millions compared to Heartbleed,’ or even more terrifying, ‘Shellshock: A deadly new vulnerability that could lay waste to the internet.’ While these headlines are a bit dramatic, there lies some truth in the statements. The National Institute for Standards

  • 23 SEP 14

(Video) Are You Following Password Best Practices?

As an IT professional you juggle over 100 tasks a day, making sure everyone’s computers are up and running, no disasters are occurring, all while maintaining your entire network’s security. All of your daily responsibilities revolve around passwords and as an administrator you and your team are the keepers of ‘the keys to the kingdom.’

  • 16 SEP 14

What is a smart grid and why should I care about it?

In the United States, we depend on the electrical grid to power our homes, our businesses, and several leisurely pastimes (late-night soccer, anyone?). Today, that grid is “smart,” which is a catchy way of saying it uses modern technology for operation and automation, a technology trendseen in everything from consumer gadgets to datacenters. Just as