In the Press

Stay up to date on Thycotic news.

September 2015

New Products of the Week – 9.21.2015 | Network World
19 Scenes That Show VMware’s VMworld Conference Is Crazier Than Ever | CRN

August 2015

35 Business Leaders Share Their Daily Habits | Time
Survey Roundup: Cloud Security Risks of the Highly Privileged | Wall Street Journal
Two Decades In, DC-Based Thycotic Goes on a Tear | DC Inno
Sensitive Credentials Are The Keys to Large Amounts of Critical Data, According to Hackers | MediaBUZZ
75% of Hackers Say Privileged Accounts are Just as Easy to Compromise as they were two Years Ago | Information Security Buzz
75% of Hackers Say Privileged Accounts Are Still Easy to Compromise | Dark Reading
Privileged Account Security Still Vulnerable Despite Security Increases | IT Business Edge
Hackers Report Easy Access to Privileged Accounts Despite Increased Security Spending | InfoTech Spotlight
Privileged accounts are still easy to compromise | Help Net Security
Applying Layered Security Defenses to Oil and Gas Environments | Oil and Gas Monitor
How Can We Work Smarter in Security? [VIDEO] | Dark Reading

July 2015

The Daily Habits of 35 People at the Top of Their Game | Inc.

New Money: These DC Companies Raised Millions This Week | DC Inno

Thycotic Received Significant Investment from Insight Venture Partners to Meet Growing Demand for Privileged Account Management Solutions | Insight Press
Thycotic Receives Investment from Insight Venture Partners | FinSMEs

June 2015

The Daily Habits of 20 Highly Successful People | Inc.
Comments on 2 year Snowden anniversary | Information Security Buzz
Episode 28: Rising Government Risk, POS Breach Lull and the Snowden Anniversary with Thycotic’s Nathan Wenzler [PODCAST] | Surf Watch Labs
Bomgar and Thycotic Team Up for Privileged Identity Management | Identity Management Solutions Review

May 2015

Agile security lessons from Aetna and the state of Texas | CSO
Security Survival Guide: 10 Steps for Protecting Patient Data | HealthData Management
Thycotic Secret Server 8.8 Enhances Privileged Account Security | Infosecurity Magazine

April 2015

InfoSec pros reject DHS criticisms of encryption | CSO
USTR: Still concern over China regs — No new trial for Ross Ulbricht — Scooplet: More on Warner bill | Politico

RSA 2015 survey: 48 percent believe NSA surveillance has increased | SC Magazine

NSA Surveillance on U.S. Citizens Just as Bad If Not Worse Since Snowden, Survey Says | DC Inno

NSA surveillance since Snowden revelations is strong as ever | Help Net Security

Expert Comments on CompTIA | Information Security Buzz
U Central Florida Enhances IT Security with Privileged Account Management System | Campus Technology
8 Identity & Access Metrics To Manage Breach Risks | Dark Reading

March 2015

UCF strengthens privileged account security to protect data | University Business

How Marketers Can Prepare for a Cyber Security Crisis | Chief Marketer
DC Inno Announces The #DCTechMadness’s 150 Startup Finalists | DC Inno
2015 Security Predictions and Directions | Info Security Products Guide

February 2015

University uses secret vault for improving data security | eCampus News
Products of the Week 02.16.2015 | Network World
Thycotic Releases Secret Server 8.8 for Enterprise Account Management | CMS Wire

January 2015

21 Management Experts Share the Biggest Mistake Companies Make When Managing Multiple Contractors or Consultants | Zintro
Lack of security in small companies means big risk for the enterprise | CSO
U San Diego Tightens Access to Privileged Passwords | Campus Technology
State of the Union address disappoints security experts | CSO
The New Reality: Inevitability of Data Breaches and How to Mitigate Risk | WIRED
Obama Proposes New 30-day Data Breach Notification Law | MIS Asia
Obama Proposes New 30-day Data Breach Notification Law | CIO Asia
Obama Proposes New 30-day Data Breach Notification Law | PC Advisor
Obama Proposes New 30-day Data Breach Notification Law | IT News
Obama Proposes New 30-day Data Breach Notification Law | InfoWorld
Obama Proposes New 30-day Data Breach Notification Law | CSO Australia
Obama Proposes New 30-day Data Breach Notification Law | CIO
Obama Proposes New 30-day Data Breach Notification Law | CSO
University Adds Email Security Measures | Yale Daily News

December 2014

Then and Now: Skills and Requirements of a Network Security Engineer in 2009 vs. in 2014 | Intense School
9 Founders Share Their New Year’s Resolutions for Work-Life Balance | Tech Cocktail
Using Thycotic Secret Server to Rotate VMware ESXi Root Passwords | IT Diversified
Lessons from the Sony Hack: Prioritize Privileged Account Management | VMblog
What Will 2015 Bring for IT Security? | Information Security Buzz
Hackers For Hire [VIDEO] | Al Jazeera America
You Know You’re an Entrepreneur When You Do This on Christmas | Tech Cocktail
FIDO Pursues Vision of a Password-Free World | TechNews World
Don’t Advertise Your Passwords | America’s Backbone
Passwords Are The New Data: Protecting Healthcare’s First Line of Defense | Tripwire

November 2014

5 Ways to Escape Password Hell | Network World
IT Security Stories to Watch: Cybercriminals Attack the White House | MSP Mentor

October 2014

Focus on IT security: LabTech Software | MSP Mentor
Reality is the Best Medicine for Healthcare Data Security | Western Pennsylvania Healthcare News
Recent Data Breaches Show Range of Enterprise Security Weak Points | Tech Target
No Money, Mo Problems – Cybercrime and Healthcare | HackSurfer

September 2014

Active Directory Security with Group Management Tools | Tom’s Guide
Why Hackers Love to Attack College Campuses | Tom’s Guide
Why Would Hackers Be After Your Network? | Kaspersky Lab Daily
The Dangers Hidden in the Shadow Cloud |Central Desktop
SalesForce Issues Dyre Warning | CRM Buyer
USA TODAY Snapshots: Hackers’ Targets | USA Today
Hot Products from VMworld | Computerworld UK
A Federal Program that Could Turn Your Town into a Warzone | The Daily Reckoning
99 per cent of hackers say basic tactics like phishing are still effective | Business Technology
What are hackers thinking? | PC Magazine

August 2014

TechTarget’s Announces “Best of VMworld” 2014 Award Winners | Yahoo Finance
Where Does a Hacker’s Drive Come From? | IT Pro Portal
Most Hackers Don’t Do It for Financial Gain | IT Manager Daily
Survey: Most Hackers Believe They’re Above the Law |
Password1 tops lists of top 10 corporate environment passwords | NetworkWorld
Even Hackers Worry About Getting Hacked |
Survey: Most hackers think they’re above the law | Daily Mashable
The Hacker Psyche: Decrypting The Mystery | VPN Creative
Survey Roundup: Ignorant about Compliance | The Wall Street Journal
Catch Me If You Can, A Majority of Hackers Think So | Computer Business Review
What the Hack? 5 Ways Hackers Can Attack MSPs and Their Customers | MSPMentor
Informal Poll: Contractors are the Favorite Target of Hackers | HackSurfer
Where does a hacker’s drive come from? | ITProPortal
Most Hackers Hack for ‘Fun,’ Survey Says | InfoPackets
Protecting the Smart Grid from Cyber Threats | Information Security Buzz
Would You Hire Your Hacker? | WIRED
Why contractors’ home networks are a security threat | CSO
Study Says Most ‘Black Hat’ Hackers Don’t Believe What They Do Is Wrong | TechSpot
Majority of Hackers Do It for the Thrill, Believe They Won’t Be Caught: Survey | SitePro News
The Anatomy of a Hacker: 86% Don’t Believe They’ll Face Repercussions | MSP Mentor
Survey Shows Hackers Feel Above the Law | NextPowerUp
Hackers Think They are Above the Law, Survey Shows | Technology Tell
Vast Majority of Hackers Believe They’re Above the Law — survey | CNET
Survey: Most Hackers Do It for the Lulz | PCWorld
Survey: Most Hackers Do It for the Lulz | NetworkWorld
Survey: Most Hackers Do It for the Lulz | CSO Online
What motivates modern hackers? | BetaNews
86% of hackers don’t worry about repercussions | Help-Net Security
Password Software Expert Discusses New Data Breach Report [VIDEO] | Fox TV

July 2014

Passwords Are Key When Firing Employees | ZDNet
Thycotic CEO Jonathan Cogley on Getting Hired | Wall Street Journal Radio
‘Yo’ App Hired It’s Hacker – Would You? | Cybercoders
Beach Reads for Techies 2014 – Ben Yoder from Thycotic | ComputerWorld

June 2014

Why Your Culture Clash Could Be Costing You the A Players | Smart CEO
New Products of the Week 06.30.14 | Network World
The Science of Identifying Insider Threats | Wired Insights
Thycotic Expands Password Security Offering | Information Security Buzz
Securing Home Networks for Telecommuting | Dell Tech Page One
How to Avoid the Costly Headaches of a Data Breach | IT Business Edge

May 2014

Five Deadliest Cyberthreats Spread as New Attacks Emerge | Credit Union Times
The Hacker Beside You | Transaction World
Where Should a Small Business Start With Cybersecurity? | HackSurfer

April 2014

The True Costs of a Modern Data Breach | Wired Insights
Tax Fraud, ID Theft and Keeping Your Data Safe | HackSurfer
Why Are Business So Vulnerable to Cyberattacks | Dell Tech Page One
Access Management Software Increase IT Admin Productivity | THOMASNET News

March 2014

How Social Engineering Attacks Target Web Hosting Support Staff | The WHIR
Salted Hash: Top Security News | CSO
48% of RSA Conference Attendees Believed The NSA Overstepped Boundaries | Softpedia
Fewer Than Half of RSA Attendees think NSA Overstepped: Survey | SecurityWeek
Less Than Half of RSA Attendees think NSA Surveillance is Wrong | Infosecurity Magazine
Galaxy S5 Could Win Over Mobile Payment Skeptics | Tech News World
Fewer Than Half of IT Pros at RSA Conference Say NSA Went Too Far | DarkReading
Just 48% of RSA Attendees Surveyed Think NSA Overstepped Boundaries | TweakTown
Would You Hire Edward Snowden? | Baltimore Business Journal
RSA News: Thycotic Announces RSA Survey Results | Gov Info Security
RSA News: Thycotic Announces RSA Survey Results | infoRisk Today
RSA Conference Attendees Ambivalent About NSA Tactics | Help Net Security

February 2014

Revisiting Recent Hacks with Kevin Jones of Thycotic Software | ZDNet
The Seven Deadly Sins of Privileged Account Management | IT Business Edge
Three Insiders Who Could Be Stealing Your Data Right Now | Information Security Buzz
Thycotic Expands DC Office | Washington Post
Privileged Accounts within SDDC | The Virtualization Practice

July 2013

Are Your Privileged Passwords Out to Get You? | Cyber Defense Magazine

February 2013

Startup Tech Firms Drive US Job Creation | Huffington Post

September 2012

6 Cybersecurity Measures for Your Business | Mashable

March 2012

10 of The Best US Tech Companies to Work For in 2012 | Business Insider
Password Management for the Enterprise | CIO Zone

October 2015

Thycotic Announces Record-Breaking Revenue and Growth for Q3 2015 | PR Newswire

September 2015

Thycotic Names Steve Kahan Chief Marketing Officer | PR NewsWire
Thycotic Unveils Solution for Rapid, Limitless Scalability of Privileged Account Management Deployments in Secret Server 8.9 | PR NewsWire

August 2015

Thycotic Names James Legg President and Chief Operating Officer | PR Newswire

July 2015

Thycotic Secret Server 8.8 Honored as Silver Winner in the 10th Annual 2015 Hot Companies and Best Products Awards in Security Software | PR NewsWire
Thycotic Partners with Secu A/S to Provide Privileged Account Security in the Swedish Market | MyPressWire
Thycotic Receives Significant Investment from Insight Venture Partners to Meet Growing Demand for Privileged Account Management Solutions | PR Newswire

June 2015

Media Alert: Oil & Gas Summit 2015
Bomgar and Thycotic Partner to Improve Privileged Account Access Security | Businesswire

May 2015

Thycotic Named One of Washington Business Journal’s Best Places to Work in 2015 | PR Newswire

Point Loma Nazarene University Secures Privileged Account Passwords with Secret Server | PR Newswire
NSA Surveillance Since Snowden Revelations is Strong as Ever, According to RSA Attendees | PR Newswire
Thycotic Partners with Rapid7 for Enhanced Vulnerability Management | PR Newswire
Thycotic Announces HSM Integration with Thales | PR Newswire

March 2015

University of Central Florida Strengthens Privileged Account Security to Protect Student, Donor and Alumni Data | PR Newswire

February 2015

Thycotic Announces First UNLOCKED User Conference in Chicago | PR Newswire
Alpha Generation Distribution Announces New Partnership with Thycotic for Privileged Account Management | PR Web
Thycotic Increases Flexibility of Privileged Account Management with Secret Server 8.8 | PR Newswire

January 2015

Thycotic Named As Finalist in 2015 Stevie® Awards for Sales and Customer Service | PR Newswire
University of San Diego Centralizes Privileged Account Password Security with Thycotic Secret Server | PR Newswire
Thycotic Named as SC Magazine 2015 Excellence Award Finalist | PR Newswire

November 2014

Global Rise in Privileged Account Abuse Drives Record Growth for Thycotic | PR Newswire

October 2014

Thycotic and IANS Study Finds that 100% of Respondents Have Fallen Victim to Cybercrime in the Past Two Years | PR Newswire

San Francisco Ballet Dances around Potential Security Weaknesses with Thycotic Secret Server | PR Newswire

September 2014

International Rescue Committee Secures Beneficiary, Donor and Employee Information with Secret Server | PR Newswire

Thycotic Secret Server Named Finalist for Best of VMworld 2014 | PR Web

August 2014

Thycotic Ranks No. 2671 on the 2014 Inc. 5000 with Three-Year Sales Growth of 141% | PR Web
Thycotic Enhances Secret Server With Support for VMware ESX and ESXi | PR Web
86% of Hackers Don’t Believe They’ll Ever Face Repercussions | PR Newswire

June 2014

Thycotic Expands Password Management Offering By Extending PAM Capabilities to Non-IT Staff | PR Web
Secure-24 Helps Customers Meet Data Compliance Needs with Thycotic Secret Server | PR Web

May 2014

Thycotic Software Partners with BalaBit IT Security to Reduce Opportunity for Privileged Account Abuse | PR Web

April 2014

Thycotic Software Enhances Secret Server Performance with Session Monitoring, SSH Features | PR Newswire

March 2014

Industry Analyst Firm Designates Thycotic Software an Innovation Leader in Privileged Management | PR Web
Interop Las Vegas Preview Announcements From More Than 100 Exhibitors and Sponsors | PR Newswire
Thycotic Software and LogRhythm Partner to Provide Better Security Awareness for IT Administrators | PR Web

February 2014

Thycotic Software Announces Common Event Format Certification with the HP ARCSIGHT Platform | PR Web
Thycotic Software Teams with Tenable Network Security to Create Better Network Intelligence on Privileged Account Use | PR Web
Fewer Than Half of RSA Conference Attendees Surveyed are Convinced That the NSA Overstepped Its Bounds on Domestic Surveillance | PR Web

January 2014

Commitment to Simplicity and Efficiency Results in Record Number of IT Professionals Now Using Thycotic Secret Server | PR Web

December 2013

Thycotic Software Announces Technology Alliance with Splunk | PR Web
Thycotic Software Improves Discovery for Service Accounts, Adds Protocol Handler and Multiple Launchers in 8.4 | PR Web

November 2013

Thycotic Software to Present on Enterprise Privileged Identity Management at the Gartner IAM Summit 2013 | PR Web
Thycotic Software Adds SIEM Integration and AD Attribute Management in Password Reset Server 3.0  | PR Web

October 2013

Thycotic Software Adds SAML Integration for Single Sign-On to Secret Server | PR Web
Qualys and Thycotic Software to Host Webinar on Authenticated Scanning | PR Web

September 2013

Thycotic Software Featured in Inc. Magazine’s Annual Exclusive List of America’s Fastest Growing Private Companies | PR Web

March 2012

Qualys Announces New Integration with Thycotic Secret Server | Qualys Blog

August 2007

Thycotic Software Ltd.’s Password Management System Addresses Security Compliance Regulations | BusinessWire

  • Media inquiries?

    Contact our public relations team today.