+1-202-802-9399 U.S. Headquarters

Thycotic’s CyberSecurity Publication


Filter by Tags: 

Articles for May, 2014

SSL: Beyond the Basics Part 3: Certificates

May 22nd, 2014

In our previous post, we discussed configuring TLS cipher suites to maximize security by preferring newer, more secure ciphers and removing older ones where possible. For this post, we will take a closer look at different types of certificates that are used in HTTPS. The certificate is responsible for several different things when securing a…

Secret Server Disaster Recovery 101: Part 2

May 20th, 2014

So you’ve taken measures to protect and preserve your information. Now how do you restore it in a disaster? Part 2 of our Disaster Recovery series explains how you can quickly restore a working copy of Secret Server in the case that your primary instance of Secret Server fails. Note that the following steps assume…

SSL: Beyond the Basics Part 2: Ciphers

May 16th, 2014

In our previous post, we discussed the different protocols for SSL and TLS, and how we can improve security by disabling older, less secure protocols and enabling newer, more secure ones. Today, we will talk about ciphers, which is one of the key pieces to making these protocols work. Here’s a quick refresher from last…

Sneak Peek! New Secret Server user interface coming in version 8.6.

May 13th, 2014

One more reason to follow our blog – you get to see product features before they are released! Our next release is coming later this month, and it includes a big change: a brand new UI that we think you’re going to love. Secret Server customers already know the application is built to be easy…

SSL: Beyond the Basics

May 8th, 2014

Part 1: Protocol Selection Here at Thycotic we have a wide range of recommended security best practices for our customers, and one of the first things we recommend is setting up SSL, or Secure Socket Layer, for Secret Server. Setting up SSL is fairly trivial once an SSL certificate is obtained. Once it’s set up,…