+1-202-802-9399 U.S. Headquarters

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Articles for July, 2014

Step-by-Step Guide: Getting Started with Secret Server

July 15th, 2014

You’ve taken the first step to securing your privileged account passwords by requesting a Secret Server trial. Now what? Don’t worry, the evaluation is simple and fast. To make your life even easier, we prepared a step-by-step guide so you know what to do and who to include in the process. We’ll offer these tips


Cipher Lock: Store Physical Secrets in Secret Server

July 10th, 2014

Cipher locks are still widely used today, but a major concern still exists and that’s how to manage and secure them. A cipher lock is a lock that is opened with a programmable keypad that is used to limit and control access to a highly sensitive area. Many organizations use cipher locks to control access


Define, Apply , and Standardize Security Policies across Secret Server

July 2nd, 2014

When managing sensitive, privileged accounts, the ability to dial down granular policies and controls is imperative for a strong security posture. Secret Server provides a wide landscape of customization for security policies on Secrets. Most configurations can be set at either the Template or the Secret level. This approach provides admins global and granular control


Don’t let your company’s social media get hacked: Deploy Secret Server to end-users

July 1st, 2014

An innocent action performed by an Austrian teen recently affected the Twitter handles of BBC News and CNN accounts. He was experimenting with HTML when he exploited an open vulnerability in TweetDeck, Twitter’s social media management platform. Over 10.1 million of BBC News’s followers received a self-retweeting hack, in just seconds damaging the reputation of