Phone Number +1-202-802-9399 (US)

Thycotic’s Cyber Security Blog

FEATURED STORY:

Cyber Security Incident Response and Reporting Process

Cyber threats to organizations are on the rise! How will you respond to an incident?

Filter by Tags: 

Video How-to: Customizing Your Company’s Secret Server

June 10th, 2014

If you follow our blog, you’ll know Secret Server version 8.6 includes a new user interface. This week, we’re bringing you a how-to video all about the theme roller. Jacob Stucky, UI Team Lead, walks you through the steps to customize Secret Server with your company’s theme. Theme Roller How-to  Basic Dashboard In addition to…


SSL: Beyond the Basics Part 4: Strict Transport Security

June 5th, 2014

In our previous post, we discussed SSL certificates and new cryptographic functionality that can be used with modern SSL certificates. Next, we are going to look at how to make sure SSL is always used for web clients in a browser. SSL doesn’t do much for securing browsers if it isn’t used, which is why…


SSL: Beyond the Basics Part 3: Certificates

May 22nd, 2014

In our previous post, we discussed configuring TLS cipher suites to maximize security by preferring newer, more secure ciphers and removing older ones where possible. For this post, we will take a closer look at different types of certificates that are used in HTTPS. The certificate is responsible for several different things when securing a…


Secret Server Disaster Recovery 101: Part 2

May 20th, 2014

So you’ve taken measures to protect and preserve your information. Now how do you restore it in a disaster? Part 2 of our Disaster Recovery series explains how you can quickly restore a working copy of Secret Server in the case that your primary instance of Secret Server fails. Note that the following steps assume…


SSL: Beyond the Basics Part 2: Ciphers

May 16th, 2014

In our previous post, we discussed the different protocols for SSL and TLS, and how we can improve security by disabling older, less secure protocols and enabling newer, more secure ones. Today, we will talk about ciphers, which is one of the key pieces to making these protocols work. Here’s a quick refresher: In daily…


https://thycotic.com/wp-includes/images/media/default.png

Sneak Peek! New Secret Server user interface coming in version 8.6.

May 13th, 2014

One more reason to follow our blog – you get to see product features before they are released! Our next release is coming later this month, and it includes a big change: a brand new UI that we think you’re going to love. Secret Server customers already know the application is built to be easy…


SSL: Beyond the Basics

May 8th, 2014

Part 1: Protocol Selection Here at Thycotic we have a wide range of recommended security best practices for our customers, and one of the first things we recommend is setting up SSL, or Secure Socket Layer, for Secret Server. Setting up SSL is fairly trivial once an SSL certificate is obtained. Once it’s set up,…


Secret Server Disaster Recovery 101: Part 1

April 22nd, 2014

FORM YOUR DR Just like any tool that enhances your company’s security, the security of the tool itself is of ultimate importance. That means no back-doors and no way for Thycotic or anyone other than yourselves to decrypt your data. This is really important, but a disaster recovery plan is critical to ensure your organization’s…


IT’s TIME: Update Those Security Settings with PowerShell

March 18th, 2014

Secret Server 8.4, released in January, included additional ways to update Secret security settings via the web services API. This week, we’ll show you how to use PowerShell to access the Secret Server web services API and configure security settings for Secrets. Web Service security settings: What’s available? The web services API can help you…


Streamline Compliance with your Internal Security Policy by using Secret Server

March 4th, 2014

Incorporating a new tool into your company’s overall security architecture can be a tricky and time-consuming process. Fortunately, Thycotic Secret Server has a several features that streamline the process of complying with your existing corporate requirements. In this post, we will take a look at a few ways Secret Server can work in conjunction with…