+1-202-802-9399 (US)

Thycotic’s Cybersecurity Publication

FEATURED STORY:
Cyber Security Responsibilities: Who owns your organization’s PAM Policy Template? 

Who is responsible for creating, implementing and overseeing your organization’s Privileged Account Management Policy template? And what is at risk if no individuals or departments are named to ensure that your users and systems are in compliance with your PAM Policy?

Filter by Tags: 

NSA Surveillance Strong as Ever Since Snowden Revelations, According to RSA Security Pros

June 2nd, 2015

Security professionals from across the world ventured to San Francisco this April for RSA Conference’s 26th annual information security conference. This year broke a record for the largest attendance of all time with 33,000 in attendance. RSA Conference’s theme this year was ‘Where the World Talks Security’. We thought what better place than RSA to…


Hacking Communities in the Deep Web, Part 1

May 27th, 2015

Editor's Note: We've partnered with the InfoSec Institute author Pierluigi Paganini to offer a two part guest blog post series on the changing roles of hackers and their communities in the deep web. Have you had experiences in the deep web? Share your stories in the comment section below. The role of hackers has changed over the years,…


How to Use Passwords for Better Cyber Security

May 12th, 2015

Passwords have been the pillar of computer security longer than anyone can remember. In today’s world, however, enterprise passwords can add little to no security unless both end-users and IT administrators take their implementation seriously. In this article, we will discuss how to create a password that is effective at delaying and deterring the efforts…


RSA Attendees Believe NSA Surveillance is as Strong as Ever

May 5th, 2015

During the 2015 RSA conference held in San Francisco, we hit the floor to survey more than 200 conference attendees to gauge their thoughts on the current climate of information security, the NSA, the newly formed Cyber Threat Intelligence Integration Center (CTIIC) and more. 94% of surveyed RSA attendees feel that the NSA’s surveillance of…


Get More Customization and Security Features with Password Reset Server 4.1

April 22nd, 2015

Password Reset Server Account Lockouts Sometimes, users forget their password, but they think that if they just try one more time they will get the right combination. If they are lucky, it works. If they are not lucky, all those failed logon attempts add up, and they end up locking out their Active Directory account.…


The 6 D’s of Cyber Security Part 2

April 14th, 2015

In last week’s article, we discussed the first 3 D’s of cyber security: Deter, Detect, and Defend. This week, we will discuss the remaining three security concepts that can help you reduce the risk of your organization facing potentially costly incidents due to external threats: Deflect, Document, and Delay. Deflect Wouldn’t it be nice if…


The 6 D’s of Cyber Security Part 1

April 7th, 2015

In this two-part series we will discuss the 6 D’s of cyber security and how you can implement them in your own cyber defense strategy. This week we look at Deter, Detect, and Defend. Creating a holistic approach to your cyber security plan using these 6 references can drastically reduce your organization’s risk. Deter Creating…


How Marketers Can Prepare for a Cyber Security Crisis

March 31st, 2015

Do you have a cyber security plan? What happens when a corporate social media account is hijacked for mischief or political gain? Or when sexually explicit Tweets are accidentally published because corporate account access was mismanaged? In an ever-evolving cyber security climate where we hear about a new corporate breach almost every day, brands are…


New HSM Integration: Secret Server and Thales e-Security

March 17th, 2015

Secret Server 8.8 includes Thales integration and support for their Hardware Security Module (HSM). The Thales integration brings an additional layer of protection to Secret Server by controlling the Secret Server encryption key within the HSM. What are HSMs? They are devices that manage and store the keys used to encrypt and decrypt data –…


Don’t FREAK—A Zombie Security Flaw from the 90’s?

March 10th, 2015

Nearly a third of encrypted websites were vulnerable to yet another SSL-related security flaw – this one dubbed the “FREAK” vulnerability, standing for Factoring RSA Export Keys. The gist of the FREAK attack is that attackers can intercept traffic between client and server – traffic that is supposed to be encrypted with SSL or TLS.…