+1-202-802-9399 U.S. Headquarters

Thycotic’s Cybersecurity Publication

FEATURED STORY:
5 Shocking Insights into the Social Network Habits of Security Professionals 

Hacking social media accounts has never been easier. Attackers take advantage of poor password hygiene and usually hijack an account and hold it for ransom. It’s difficult to get the real picture, but according to Facebook, accounts are hacked 600,000 times a day. And even worse, 80% of all cyber security attacks involve a weak or stolen password.

Filter by Tags: 

Cipher Lock: Store Physical Secrets in Secret Server

July 10th, 2014

Cipher locks are still widely used today, but a major concern still exists and that’s how to manage and secure them. A cipher lock is a lock that is opened with a programmable keypad that is used to limit and control access to a highly sensitive area. Many organizations use cipher locks to control access…


Define, Apply , and Standardize Security Policies across Secret Server

July 2nd, 2014

When managing sensitive, privileged accounts, the ability to dial down granular policies and controls is imperative for a strong security posture. Secret Server provides a wide landscape of customization for security policies on Secrets. Most configurations can be set at either the Template or the Secret level. This approach provides admins global and granular control…


Don’t let your company’s social media get hacked: Deploy Secret Server to end-users

July 1st, 2014

An innocent action performed by an Austrian teen recently affected the Twitter handles of BBC News and CNN accounts. He was experimenting with HTML when he exploited an open vulnerability in TweetDeck, Twitter’s social media management platform. Over 10.1 million of BBC News’s followers received a self-retweeting hack, in just seconds damaging the reputation of…


Real Time Security with Secret Server and BalaBit IT

June 12th, 2014

Since Thycotic started in 1996 as an IT consulting company we’ve kept to our roots by listening to customer feedback before implementation, new features and integrations. Based on this feedback, we’ve added many proactive security features to Secret Server over the last few years, things like custom reports and detailed auditing, role-based access, session recording,…


Video How-to: Customizing Your Company’s Secret Server

June 10th, 2014

If you follow our blog, you’ll know Secret Server version 8.6 includes a new user interface. This week, we’re bringing you a how-to video all about the theme roller. Jacob Stucky, UI Team Lead, walks you through the steps to customize Secret Server with your company’s theme. Theme Roller How-to  Basic Dashboard In addition to…


SSL: Beyond the Basics Part 4: Strict Transport Security

June 5th, 2014

In our previous post, we discussed SSL certificates and new cryptographic functionality that can be used with modern SSL certificates. Next, we are going to look at how to make sure SSL is always used for web clients in a browser. SSL doesn’t do much for securing browsers if it isn’t used, which is why…


Secret Server 8.6 is here!

June 3rd, 2014

This past week, our team released Secret Server 8.6, complete with a brand new look and feel and assortment of new features. Whether you’ve already upgraded or are planning to do so, here’s an overview of the highlights to check out: UI Updates The most obvious update in version 8.6 is our UI. The look…


SSL: Beyond the Basics Part 3: Certificates

May 22nd, 2014

In our previous post, we discussed configuring TLS cipher suites to maximize security by preferring newer, more secure ciphers and removing older ones where possible. For this post, we will take a closer look at different types of certificates that are used in HTTPS. The certificate is responsible for several different things when securing a…


Secret Server Disaster Recovery 101: Part 2

May 20th, 2014

So you’ve taken measures to protect and preserve your information. Now how do you restore it in a disaster? Part 2 of our Disaster Recovery series explains how you can quickly restore a working copy of Secret Server in the case that your primary instance of Secret Server fails. Note that the following steps assume…


SSL: Beyond the Basics Part 2: Ciphers

May 16th, 2014

In our previous post, we discussed the different protocols for SSL and TLS, and how we can improve security by disabling older, less secure protocols and enabling newer, more secure ones. Today, we will talk about ciphers, which is one of the key pieces to making these protocols work. Here’s a quick refresher from last…