Thycotic Blog

Technical Product Updates and Industry Trends

  • Hacking Communities in the Deep Web Part 2

    Hacking Communities in the Deep Web Part 2

    Editor’s Note: Black Hat 2015 may be over 3 months away, but we always have hacking on our minds. This year marks Black Hat’s 18th anniversary with even more training sessions, briefings, and information sharing opportunities with the top information security experts from across the globe. We’ve partnered with the InfoSec Institute author Pierluigi Paganini to offer a two

    Read more →
  • Why do employees choose to become insider threats?

    Why do employees choose to become insider threats?

    A company went out of business. A person was marked as deceased in a large government database. A company’s domain name was added to anti-spam blacklists. All of these are outcomes of insider threat cases documented in The CERT Guide to Insider Threats, and could easily happen to any business today that does not have the

    Read more →
  • NSA Surveillance Strong as Ever Since Snowden Revelations, According to RSA Security Pros

    NSA Surveillance Strong as Ever Since Snowden Revelations, According to RSA Security Pros

    Security professionals from across the world ventured to San Francisco this April for RSA Conference’s 26th annual information security conference. This year broke a record for the largest attendance of all time with 33,000 in attendance. RSA Conference’s theme this year was ‘Where the World Talks Security’. We thought what better place than RSA to

    Read more →
  • Hacking Communities in the Deep Web Part 1

    Hacking Communities in the Deep Web Part 1

    Editor’s Note: Black Hat 2015 may be over 3 months away, but we always have hacking on our minds. This year marks Black Hat’s 18th anniversary with even more training sessions, briefings, and information sharing opportunities with the top information security experts from across the globe. We’ve partnered with the InfoSec Institute author Pierluigi Paganini to offer a two

    Read more →
  • How to Use Passwords

    How to Use Passwords

    Passwords have been the pillar of computer security longer than anyone can remember. In today’s world, however, passwords can add little to no security unless both end users and IT administrators take their implementation seriously. In this article, we will discuss how to create a password that is effective at delaying and deterring the efforts

    Read more →
  • RSA Attendees Believe NSA Surveillance is as Strong as Ever

    RSA Attendees Believe NSA Surveillance is as Strong as Ever

    This year, during the RSA conference held in San Francisco, we hit the floor to survey more than 200 conference attendees to gauge their thoughts on the current climate of information security, the NSA, the newly formed Cyber Threat Intelligence Integration Center (CTIIC) and more. 94% of surveyed RSA attendees feel that the NSA’s surveillance

    Read more →