Thycotic Blog

Technical Product Updates and Industry Trends

  • RSA Attendees Believe NSA Surveillance is as Strong as Ever

    RSA Attendees Believe NSA Surveillance is as Strong as Ever

    This year, during the RSA conference held in San Francisco, we hit the floor to survey more than 200 conference attendees to gauge their thoughts on the current climate of information security, the NSA, the newly formed Cyber Threat Intelligence Integration Center (CTIIC) and more. 94% of surveyed RSA attendees feel that the NSA’s surveillance

    Read more →
  • Get More Customization and Security Features with Password Reset Server 4.1

    Get More Customization and Security Features with Password Reset Server 4.1

    Password Reset Server Account Lockouts Sometimes, users forget their password, but they think that if they just try one more time they will get the right combination. If they are lucky, it works. If they are not lucky, all those failed logon attempts add up, and they end up locking out their Active Directory account.

    Read more →
  • The 6 D’s of Cyber Security Part 2

    The 6 D’s of Cyber Security Part 2

    In last week’s article, we discussed the first 3 D’s of cyber security: Deter, Detect, and Defend. This week, we will discuss the remaining three security concepts that can help you reduce the risk of your organization facing potentially costly incidents due to external threats: Deflect, Document, and Delay. Deflect Wouldn’t it be nice if

    Read more →
  • Thycotic Named an Honoree in Washington Business Journal’s Best Places to Work 2015!

    Washington Business Journal announced the honorees this week for their 11th annual Best Places to Work awards and we are thrilled to have made it on the list for 2015! The ranking is based on the voluntary feedback of employees who anonymously provide their input via the Washington Business Journal’s review survey. What makes a

    Read more →
  • The 6 D’s of Cyber Security Part 1

    In this two-part series we will discuss the 6 D’s of cyber security and how you can implement them in your own cyber defense strategy. This week we look at Deter, Detect, and Defend. Creating a holistic approach to your cyber security plan using these 6 references can drastically reduce your organization’s risk. Deter Creating

    Read more →
  • How Marketers Can Prepare for a Cyber Security Crisis

    Do you have a cyber security plan? What happens when a corporate social media account is hijacked for mischief or political gain? Or when sexually explicit Tweets are accidentally published because corporate account access was mismanaged? In an ever-evolving cyber security climate where we hear about a new corporate breach almost every day, brands are

    Read more →