+1-202-802-9399 U.S. Headquarters

Thycotic’s Cybersecurity Publication

FEATURED STORY:
5 Shocking Insights into the Social Network Habits of Security Professionals 

Hacking social media accounts has never been easier. Attackers take advantage of poor password hygiene and usually hijack an account and hold it for ransom. It’s difficult to get the real picture, but according to Facebook, accounts are hacked 600,000 times a day. And even worse, 80% of all cyber security attacks involve a weak or stolen password.

Filter by Tags: 

Inheriting Permissions Based on Folders

July 29th, 2011

Inheriting Permissions based on Folders It is possible for Secrets in Secret Server to inherit permissions from the folder where they are placed. For example, if you install a new managed switch in your network, instead of setting an Active Directory group or users for every network-based Secret, you set the Active Directory group or…


Sneak Peek: PuTTY Launcher

September 11th, 2008

One of a system administrator’s must-have items in his toolbox is PuTTY. PuTTY is a small, lightweight program that is perfect for telnet and SSH connections. It doesn’t require any installation, it’s just a single EXE file and you’re good to go. A feature of Secret Server that I personally have always found extremely useful…


Giving Secret View a System Font

March 27th, 2008

One of the questions that I sometimes get from customers is, “I want the information on the Secret View page to display in a system font”. The reason for this is it makes it easier to distinguish between O’s and zeros; and lower-case L’s and capital I’s. This can easily be accomplished with CSS, and…