+1-202-802-9399 U.S. Headquarters
Free Trial

Archive for the ‘Secret Server’ Category

5 Reasons Why You Should Attend Thycotic’s UNLOCKED Conference

Tuesday, January 27th, 2015

We’re excited to announce our first user conference on Sunday, May 3, 2015, in Chicago! The one-day conference includes opportunities to connect one-to-one with Thycotic experts and your peers. Attend technical deep dive sessions to learn security best practices and build your 2015 password management plan. Here are the top 5 reasons you should attend […]

Find out what’s new in Thycotic Secret Server 8.8! (Hint, it’s got some pretty cool new security features)

Tuesday, January 20th, 2015

Thycotic Secret Server 8.8 is coming out later this month. Check out some of its new features. HSM INTEGRATON FOR ADDED SECURITY Are you a user of a hardware security module (HSM) who wishes you could integrate it with Secret Server to protect your encryption.config file? It’s your lucky day, because Secret Server 8.8 supports […]

PRIVILEGED USERS AND DATA BREACHES: A MATCH MADE IN HEAVEN?

Tuesday, December 2nd, 2014

With data breaches on the rise, more evidence is constantly being discovered to support the link between privileged accounts in organizations and network breaches. Thycotic and IANS recently conducted a survey of 100 experienced security and IT operations professionals regarding their recent data breaches and privileged account misuse, and the results show there is indeed […]

Qualys Security Conference Reveals Tension Between Security and IT Operations

Tuesday, November 11th, 2014

In my previous post, ‘Vulnerability Scanning: Is Unauthenticated Scanning Enough?’ I discussed the differences between authenticated and unauthenticated scans, and how Qualys and Thycotic work together to find vulnerabilities for better security. When performing authenticated scans, Qualys uses credentials to find sensitive issues such as malware, patches, incorrect configuration, and other vulnerabilities. It then scans […]

Predicting Potential Threat: Behavior Analytics & Threat Modeling

Tuesday, October 21st, 2014

Wouldn’t it be nice to be able to identify a potential threat before it happens? Learn how Secret Server uses threat modeling and behavioral analytics to discover and take immediate action on a threat, stopping an attacker in their tracks. Threat Modeling The term “threat modeling” has become quite popular lately as an upcoming major […]

POODLE: Not your typical walk in the park

Wednesday, October 15th, 2014

Google, among several security organizations, recently announced a vulnerability in the SSL protocol, particularly SSL version 3. SSL is used to secure connections between a client and server to prevent eavesdropping, and that the data has not been tampered. SSLv3 is an old version of the SSL protocol, dating back to 1996 and debuted with Netscape […]

Vulnerability Scanning: Is Unauthenticated Scanning Enough?

Tuesday, October 14th, 2014

Thousands of IT organizations across the world use vulnerability scanners to perform unauthenticated scans and find threats within their network. These scans find basic weaknesses and detect issues within operating systems, open network ports, services listening on open ports, and data leaked by services. This gives companies the ability to see their network from the […]

[VIDEO] What You Need to Know About Bash Bug

Tuesday, October 7th, 2014

We’ve all heard the headlines of the most recent security bug, including, ‘Shellshock bug could threaten millions compared to Heartbleed,’ or even more terrifying, ‘Shellshock: A deadly new vulnerability that could lay waste to the internet.’ While these headlines are a bit dramatic, there lies some truth in the statements. The National Institute for Standards […]

(Video) Are You Following Password Best Practices?

Tuesday, September 23rd, 2014

As an IT professional you juggle over 100 tasks a day, making sure everyone’s computers are up and running, no disasters are occurring, all while maintaining your entire network’s security. All of your daily responsibilities revolve around passwords and as an administrator you and your team are the keepers of ‘the keys to the kingdom.’ […]

Infamous Heartbleed Bug Responsible for Over 4.5 Million Patient Records Leaked

Tuesday, September 9th, 2014

Heartbleed continues to haunt the organizations as patch efforts remain ignored. In April we notified our customers that our solutions remained unaffected, but unfortunately for millions that was not the case. Over six months later a data breach at Community Health Systems is the result of the infamous Heartbleed vulnerability that several versions of OpenSSL […]