Thycotic Blog

Technical Product Updates and Industry Trends

  • The First Line of Defense – Passwords

    The IT security stakes are high for the healthcare industry – HIPAA violations and fines, criminal charges, and tainted brand reputations make up the fates of healthcare organizations that fail to protect patient data both from the inside and out. Why Healthcare is Being Targeted A large number of personally identifiable information (PII) is stored

    Read more →
  • 2014 Review: Light Speed Ahead

    With more than 3,000 customers and 180,000 users, Thycotic had the most accelerated year of growth yet. Information security professionals worldwide would agree that 2014 was the “year of the data breach”. Several recognizable brands were successfully attacked by malicious insiders and cybercriminals, skyrocketing the need for security tools to an all-time high. No business

    Read more →
  • Lessons from the Sony Hack: Prioritize Privileged Account Management

    CNN recently reveled the methodology of the cyber attack that allowed anonymous cybercriminals Guardians of Peace direct access to their network, or the “keys to the entire building,” as one Sony Pictures Entertainment official stated. According to investigators, the attack was carried out through a set of stolen system administrator credentials; a privileged account username and

    Read more →
  • 3 Tips to Stay Safe Shopping this Holiday Season

    The holidays are here, and so are many tempting sales from the nation’s largest retailers. Despite the recent trend of data breaches we have seen among consumer companies like Target and Home Depot, we doubt that will slow down 2014’s holiday shoppers. No matter where you shop, use these three tips to stay safe. Use

    Read more →
  • When the Trusted Go Rogue, and How They (almost) Got Away With It

    Jason Cornish, a former IT admin, successfully took down 88 servers of a major pharmaceutical corporation for the comfort of a fast food joint. The breach cost the company over $800,000 and caused the entire US office to shut down for three days. Unfortunately for all companies, insider threat is very hard to detect. According

    Read more →