Thycotic Blog

Technical Product Updates and Industry Trends

  • New HSM Integration: Secret Server and Thales e-Security

    Secret Server 8.8 includes Thales integration and support for their Hardware Security Module (HSM). The Thales integration brings an additional layer of protection to Secret Server by controlling the Secret Server encryption key within the HSM. What are HSMs? They are devices that manage and store the keys used to encrypt and decrypt data –

    Read more →
  • Don’t FREAK—A Zombie Security Flaw from the 90’s?

    Nearly a third of encrypted websites were vulnerable to yet another SSL-related security flaw – this one dubbed the “FREAK” vulnerability, standing for Factoring RSA Export Keys. The gist of the FREAK attack is that attackers can intercept traffic between client and server – traffic that is supposed to be encrypted with SSL or TLS.

    Read more →
  • The Top Three Ways Personally Identifiable Information is Leaked in Healthcare

    Personally identifiable information (PII) related to healthcare data is 50x more valuable on the black market than credit card data according to Alert Logic. Forty three percent of all identity thefts in the United States in 2013 were accounted to medical related identity theft (Logic, 2014). The healthcare industry knows they need to protect PII. It’s

    Read more →
  • Meet Our Customer Experts Presenting at UNLOCKED Conference

    Today we are excited to announce and introduce the Thycotic expert users leading our Birds of a Feather sessions and highly anticipated customer panel discussion at UNLOCKED conference, hosted by our founder and CEO, Jonathan Cogley. From higher education to real estate investment and legal services, our customer experts represent a wide variety of industry

    Read more →
  • Large Organization Employee Threat Assessment

    Despite the popular image of the hacker cracking distant servers from his basement, studies show that people with legitimate access to your information pose an even bigger threat. And when information is stolen from within, it’s often harder to trace and determine the extent of the problem. The larger your organization, the more is the

    Read more →
  • Universities under Attack—Securing student, faculty, and staff’s personal information

    Understanding the Size of the Education Industry Sometimes, businesses find out about a data breach the hard way – this was the case for Butler University in May 2013. Police investigating a case of identity theft in California discovered a flash drive on one of their suspects that contained the personally identifiable information (PII) of

    Read more →