Contact Us +1-202-802-9399 U.S. Headquarters

Archive for the ‘Uncategorized’ Category

PAM Security Blog Series Part 3: How to secure your privileged credentials

Tuesday, July 21st, 2015

In this video blog series, IT security experts explain why compromised privileged credentials are at the heart of most large-scale cyber-attacks, and how privileged account management can help IT teams mitigate a host of security and compliance issues. You’ve heard from the experts why privileged credentials are at the heart of most large-scale cyber-attacks, read […]

Up, up and away: How Distributed Engine technology helps Thycotic scale privileged account management for large enterprises

Tuesday, July 14th, 2015

Why Distributed Engine? When you run Discovery, Password Changing, or Heartbeat in Thycotic Secret Server, all the work is queued up inside the web application. This requires no additional configuration and works well out of box. We strive to make Secret Server easy to configure and get working quickly, but also powerful enough that when […]

PAM Security Video Series Part 2: Why Privileged Credentials Are At The Heart of Most Large-Scale Cyber Attacks

Tuesday, July 7th, 2015

In this video blog series, IT security experts explain why compromised privileged credentials are at the heart of most large-scale cyber-attacks, and how privileged account management can help IT teams mitigate a host of security and compliance issues. In our first video post for this series we debunked the common myth that passwords are dead. […]

Investment from Insight Venture Partners!

Wednesday, July 1st, 2015

2014 was a very exciting year for us at Thycotic. We experienced huge growth and we are looking ahead to an even bigger year. We’ve had over 141% year-over-year growth since 2011 and amassed a customer base of more than 3,000 companies world-wide. At this pivotal time in our growth as a company, we’re positioned […]

Hacking Communities in the Deep Web, Part 2

Tuesday, June 16th, 2015

Editor’s Note: Black Hat 2015 may be over 3 months away, but we always have hacking on our minds. This year marks Black Hat’s 18th anniversary with even more training sessions, briefings, and information sharing opportunities with the top information security experts from across the globe. We’ve partnered with the InfoSec Institute author Pierluigi Paganini to offer a two […]

Why do employees choose to become insider threats?

Tuesday, June 9th, 2015

A company went out of business. A person was marked as deceased in a large government database. A company’s domain name was added to anti-spam blacklists. All of these are outcomes of insider threat cases documented in The CERT Guide to Insider Threats, and could easily happen to any business today that does not have the […]

NSA Surveillance Strong as Ever Since Snowden Revelations, According to RSA Security Pros

Tuesday, June 2nd, 2015

Security professionals from across the world ventured to San Francisco this April for RSA Conference’s 26th annual information security conference. This year broke a record for the largest attendance of all time with 33,000 in attendance. RSA Conference’s theme this year was ‘Where the World Talks Security’. We thought what better place than RSA to […]

RSA Attendees Believe NSA Surveillance is as Strong as Ever

Tuesday, May 5th, 2015

This year, during the RSA conference held in San Francisco, we hit the floor to survey more than 200 conference attendees to gauge their thoughts on the current climate of information security, the NSA, the newly formed Cyber Threat Intelligence Integration Center (CTIIC) and more. 94% of surveyed RSA attendees feel that the NSA’s surveillance […]

Get More Customization and Security Features with Password Reset Server 4.1

Wednesday, April 22nd, 2015

Password Reset Server Account Lockouts Sometimes, users forget their password, but they think that if they just try one more time they will get the right combination. If they are lucky, it works. If they are not lucky, all those failed logon attempts add up, and they end up locking out their Active Directory account. […]

The 6 D’s of Cyber Security Part 2

Tuesday, April 14th, 2015

In last week’s article, we discussed the first 3 D’s of cyber security: Deter, Detect, and Defend. This week, we will discuss the remaining three security concepts that can help you reduce the risk of your organization facing potentially costly incidents due to external threats: Deflect, Document, and Delay. Deflect Wouldn’t it be nice if […]

Secret Server is the enterprise password management software that IT Admins and Security Pros love!

Try it FREE for 30 Days