We will be closed Monday, September 1st in observance of the U.S. Labor Day holiday. More info »

Thycotic Blog

Technical Product Updates and Industry Trends

  • SSL: Beyond the Basics Part 2: Ciphers

    In our previous post, we discussed the different protocols for SSL and TLS, and how we can improve security by disabling older, less secure protocols and enabling newer, more secure ones. Today, we will talk about ciphers, which is one of the key pieces to making these protocols work. Here’s a quick refresher from last

    Read more →
  • Sneak Peek! New Secret Server user interface coming in version 8.6.

    One more reason to follow our blog – you get to see product features before they are released! Our next release is coming later this month, and it includes a big change: a brand new UI that we think you’re going to love. If you’re lucky to be at Microsoft TechEd in Houston this week,

    Read more →
  • SSL: Beyond the Basics

    Part 1: Protocol Selection Here at Thycotic we have a wide range of recommended security best practices for our customers, and one of the first things we recommend is setting up SSL, or Secure Socket Layer, for Secret Server. Setting up SSL is fairly trivial once an SSL certificate is obtained. Once it’s set up,

    Read more →
  • Thycotic Webinar: Proactive Security Strategies for IT Teams

    Get ready Houston, TechEd North America is coming to town! With Microsoft’s premier technology conference kicking off in less than a week we wanted to do something special to get everyone ready for one of the biggest IT events of the year. That’s why we invited our special guest, veteran TechEd session leader and Microsoft

    Read more →
  • Don’t be the next target! Insider Threat Webinar: Tuesday, May 6 2014

    What is the biggest threat to your sensitive information? The security breaches at Shionogi Pharmaceuticals, South Carolina Department of Revenue and the United Way weren’t caused by external threats – they were initiated by an insider; a seemingly trustworthy employee or ex-employee of the company that had privileged account credentials allowing access to the organization’s

    Read more →
  • Secret Server Disaster Recovery 101

    Part 1: Form your DR plan Just like any tool that enhances your company’s security, the security of the tool itself is of ultimate importance. That means no backdoors and no way for Thycotic or anyone other than yourselves to decrypt your data. This is really important, but a disaster recovery plan is critical to

    Read more →