Thycotic Blog

Technical Product Updates and Industry Trends

  • 2015: When Things Get Serious

    Let’s start looking at the future of the IT Security landscape by reviewing the past. I made some predictions last year for InfoSec Institute. The article started off with a clever disclaimer that all subjects in the IT Security world are new and are still pioneering in their fields, so that anything can happen within

    Read more →
  • 5 Reasons Why You Should Attend Thycotic’s UNLOCKED Conference

    We’re excited to announce our first user conference on Sunday, May 3, 2015, in Chicago! The one-day conference includes opportunities to connect one-to-one with Thycotic experts and your peers. Attend technical deep dive sessions to learn security best practices and build your 2015 password management plan. Here are the top 5 reasons you should attend

    Read more →
  • Find out what’s new in Thycotic Secret Server 8.8! (Hint, it’s got some pretty cool new security features)

    Thycotic Secret Server 8.8 is coming out later this month. Check out some of its new features. HSM INTEGRATON FOR ADDED SECURITY Are you a user of a hardware security module (HSM) who wishes you could integrate it with Secret Server to protect your encryption.config file? It’s your lucky day, because Secret Server 8.8 supports

    Read more →
  • Thycotic named finalist in Best Customer Service category, SC Magazine Awards 2015

    Today we are thrilled to announce our selection as a finalist in the 2015 SC Magazine Awards in the “Best Customer Service” category. In its 18th year, the SC Magazine Awards showcase the top security technologies, services and professionals in information technology. A new category this year, vendors recognized for The Best Customer Service award

    Read more →
  • The First Line of Defense – Passwords

    The IT security stakes are high for the healthcare industry – HIPAA violations and fines, criminal charges, and tainted brand reputations make up the fates of healthcare organizations that fail to protect patient data both from the inside and out. Why Healthcare is Being Targeted A large number of personally identifiable information (PII) is stored

    Read more →
  • 2014 Review: Light Speed Ahead

    With more than 3,000 customers and 180,000 users, Thycotic had the most accelerated year of growth yet. Information security professionals worldwide would agree that 2014 was the “year of the data breach”. Several recognizable brands were successfully attacked by malicious insiders and cybercriminals, skyrocketing the need for security tools to an all-time high. No business

    Read more →