Thycotic will be closed on Monday, May 30, 2016 for Memorial Day.
Contact Us +1-202-802-9399 U.S. Headquarters

Archive for the ‘Security’ Category

2015: When Things Get Serious

Tuesday, February 3rd, 2015

Let’s start looking at the future of the IT Security landscape by reviewing the past. I made some predictions last year for InfoSec Institute. The article started off with a clever disclaimer that all subjects in the IT Security world are new and are still pioneering in their fields, so that anything can happen within […]

The First Line of Defense – Passwords

Wednesday, January 14th, 2015

The IT security stakes are high for the healthcare industry – HIPAA violations and fines, criminal charges, and tainted brand reputations make up the fates of healthcare organizations that fail to protect patient data both from the inside and out. Why Healthcare is Being Targeted A large number of personally identifiable information (PII) is stored […]

When the Trusted Go Rogue, and How They (almost) Got Away With It

Tuesday, December 9th, 2014

Jason Cornish, a former IT admin, successfully took down 88 servers of a major pharmaceutical corporation for the comfort of a fast food joint. The breach cost the company over $800,000 and caused the entire US office to shut down for three days. Unfortunately for all companies, insider threat is very hard to detect. According […]

PRIVILEGED USERS AND DATA BREACHES: A MATCH MADE IN HEAVEN?

Tuesday, December 2nd, 2014

With data breaches on the rise, more evidence is constantly being discovered to support the link between privileged accounts in organizations and network breaches. Thycotic and IANS recently conducted a survey of 100 experienced security and IT operations professionals regarding their recent data breaches and privileged account misuse, and the results show there is indeed […]

Access Control: Models and Methods

Tuesday, November 4th, 2014

By: Stuart Gentry, an InfoSec Institute contributor and computer security enthusiast/researcher. There are times when people need access to information, such as documents, slides, etc., on a network drive but don’t have the appropriate level of access to read and/or modify the item. This can happen at the most inconvenient time and they would need […]

Haunting Tale: Beware of the Insider

Tuesday, October 28th, 2014

We all love October for the fall nights, changing leaves, hot cider and Halloween festivities. October is also National Cyber Security Awareness Month supported by the National Cyber Security Alliance. Although we preach cyber security best practices all year, it’s an important reminder to stay safe online. In support of National Cyber Security Awareness Month […]

Predicting Potential Threat: Behavior Analytics & Threat Modeling

Tuesday, October 21st, 2014

Wouldn’t it be nice to be able to identify a potential threat before it happens? Learn how Secret Server uses threat modeling and behavioral analytics to discover and take immediate action on a threat, stopping an attacker in their tracks. Threat Modeling The term “threat modeling” has become quite popular lately as an upcoming major […]

POODLE: Not your typical walk in the park

Wednesday, October 15th, 2014

Google, among several security organizations, recently announced a vulnerability in the SSL protocol, particularly SSL version 3. SSL is used to secure connections between a client and server to prevent eavesdropping, and that the data has not been tampered. SSLv3 is an old version of the SSL protocol, dating back to 1996 and debuted with Netscape […]

Vulnerability Scanning: Is Unauthenticated Scanning Enough?

Tuesday, October 14th, 2014

Thousands of IT organizations across the world use vulnerability scanners to perform unauthenticated scans and find threats within their network. These scans find basic weaknesses and detect issues within operating systems, open network ports, services listening on open ports, and data leaked by services. This gives companies the ability to see their network from the […]

[VIDEO] What You Need to Know About Bash Bug

Tuesday, October 7th, 2014

We’ve all heard the headlines of the most recent security bug, including, ‘Shellshock bug could threaten millions compared to Heartbleed,’ or even more terrifying, ‘Shellshock: A deadly new vulnerability that could lay waste to the internet.’ While these headlines are a bit dramatic, there lies some truth in the statements. The National Institute for Standards […]

Secret Server is the enterprise password management software that IT Admins and Security Pros love!

Try it FREE for 30 Days