Thycotic will be closed Thursday and Friday, Nov. 26th and 27th for the Thanksgiving holiday. More info »

  • 02 NOV 15

Achieve PII Compliance Through Security Awareness Training

Introduction Personally Identifiable Information is defined by the National Institute of Standards and Technology (NIST) as: Information which can be used to distinguish or trace an individual’s identity, such as their name, social security number, biometric records, etc., alone, or when combined with other personal or identifying information which is linked or linkable to a

  • 05 OCT 15

New Enterprise Ticketing System Integrations Available for BMC Software and ServiceNow in Secret Server

The ability to automatically respond to and track Secret Server privileged user activity in enterprise ticketing systems is a huge benefit for our customers, because it removes the manual burden of updating and closing out tickets based on what privileged users are doing within the solution. That’s why the latest update to Secret Server now

  • 08 SEP 15

PAM Security Blog Series Part 5: Tips for Implementing Privileged Account Management Solutions

In this video blog series, IT security experts explain why compromised privileged credentials are at the heart of most large-scale cyber-attacks, and how privileged account management can help IT teams mitigate a host of security and compliance issues. Don’t take the boil the ocean approach. Implementing a privileged account management strategy is a foundational element

  • 08 SEP 15

Tips for Being A Pragmatic CSO

The cybersecurity landscape is ever-changing, with new threats and technologies appearing every single day. There are more data breaches than ever, more compliance guidelines, and more new technology to secure in the workplace that has the potential to be misused by untrained employees. So why, then, does senior management tend to see security as an

  • 12 MAY 15

How to Use Passwords

Passwords have been the pillar of computer security longer than anyone can remember. In today’s world, however, passwords can add little to no security unless both end users and IT administrators take their implementation seriously. In this article, we will discuss how to create a password that is effective at delaying and deterring the efforts

  • 31 MAR 15

How Marketers Can Prepare for a Cyber Security Crisis

Do you have a cyber security plan? What happens when a corporate social media account is hijacked for mischief or political gain? Or when sexually explicit Tweets are accidentally published because corporate account access was mismanaged? In an ever-evolving cyber security climate where we hear about a new corporate breach almost every day, brands are

  • 16 DEC 14

3 Tips to Stay Safe Shopping this Holiday Season

The holidays are here, and so are many tempting sales from the nation’s largest retailers. Despite the recent trend of data breaches we have seen among consumer companies like Target and Home Depot, we doubt that will slow down 2014’s holiday shoppers. No matter where you shop, use these three tips to stay safe. Use

  • 28 OCT 14

Haunting Tale: Beware of the Insider

We all love October for the fall nights, changing leaves, hot cider and Halloween festivities. October is also National Cyber Security Awareness Month suported by the National Cyber Security Alliance. Although we preach cyber security best practices all year, it’s an important reminder to stay safe online. In support of National Cyber Security Awareness Month

  • 12 AUG 14

Secret Server: The Getting Started Guide for End-Users

In our recent blog post, Don’t let your company’s social media get hacked: Deploy Secret Server to end-users, you learned about our new Basic User Dashboard and how to administer Secret Server to your end users. We wanted to make getting started with Secret Server simple and straightforward for your end users. Share this blog

  • 15 JUL 14

Step-by-Step Guide: Getting Started with Secret Server

You’ve taken the first step to securing your privileged account passwords by requesting a Secret Server trial. Now what? Don’t worry, the evaluation is simple and fast. To make your life even easier, we prepared a step-by-step guide so you know what to do and who to include in the process. We’ll offer these tips