Thycotic Blog

Technical Product Updates and Industry Trends

  • The 6 D’s of Cyber Security Part 2

    The 6 D’s of Cyber Security Part 2

    In last week’s article, we discussed the first 3 D’s of cyber security: Deter, Detect, and Defend. This week, we will discuss the remaining three security concepts that can help you reduce the risk of your organization facing potentially costly incidents due to external threats: Deflect, Document, and Delay. Deflect Wouldn’t it be nice if

    Read more →
  • Thycotic Named an Honoree in Washington Business Journal’s Best Places to Work 2015!

    Washington Business Journal announced the honorees this week for their 11th annual Best Places to Work awards and we are thrilled to have made it on the list for 2015! The ranking is based on the voluntary feedback of employees who anonymously provide their input via the Washington Business Journal’s review survey. What makes a

    Read more →
  • The 6 D’s of Cyber Security Part 1

    In this two-part series we will discuss the 6 D’s of cyber security and how you can implement them in your own cyber defense strategy. This week we look at Deter, Detect, and Defend. Creating a holistic approach to your cyber security plan using these 6 references can drastically reduce your organization’s risk. Deter Creating

    Read more →
  • How Marketers Can Prepare for a Cyber Security Crisis

    Do you have a cyber security plan? What happens when a corporate social media account is hijacked for mischief or political gain? Or when sexually explicit Tweets are accidentally published because corporate account access was mismanaged? In an ever-evolving cyber security climate where we hear about a new corporate breach almost every day, brands are

    Read more →
  • Unlock the Secrets of Secret Server at UNLOCKED Conference

    Do you love Secret Server as much as we do? If so, don’t miss your opportunity to join us for our first user conference, UNLOCKED, on Sunday, May 3rd. This is your chance to connect with other Secret Server power users and our privileged account management experts. I’ll let you in on a little secret-

    Read more →
  • New HSM Integration: Secret Server and Thales e-Security

    Secret Server 8.8 includes Thales integration and support for their Hardware Security Module (HSM). The Thales integration brings an additional layer of protection to Secret Server by controlling the Secret Server encryption key within the HSM. What are HSMs? They are devices that manage and store the keys used to encrypt and decrypt data –

    Read more →