Phone Number +1-202-802-9399 (US)

Thycotic’s Cyber Security Blog

FEATURED STORY:

5 Best Practice Cyber Security Tips for Working Remotely

Help your IT staff secure their remote workstations

Filter by Tags: 

VMworld Sneak Peek: ESX Discovery

August 19th, 2014

With VMworld 2014 just a week away, we wanted to showcase a special VMware announcement this week. Introducing, advanced capabilities in VMware hypervisor environments coming with the Secret Server 8.7 release. This week’s post is a deep dive into the new ESX/ESXi discovery capabilities. Learn how your team can automatically discover and begin to manage…


Secret Server: The Getting Started Guide for End-Users

August 12th, 2014

In our recent blog post, Don’t let your company’s social media get hacked: Deploy Secret Server to end-users, you learned about our new Basic User Dashboard and how to administer Secret Server to your end users. We wanted to make getting started with Secret Server simple and straightforward for your end users. Share this blog…


Step-by-Step Guide: Getting Started with Secret Server

July 15th, 2014

You’ve taken the first step to securing your privileged account passwords by requesting a Secret Server trial. Now what? Don’t worry, the evaluation is simple and fast. To make your life even easier, we prepared a step-by-step guide so you know what to do and who to include in the process. We’ll offer these tips…


Cipher Lock: Store Physical Secrets in Secret Server

July 10th, 2014

Cipher locks are still widely used today, but a major concern still exists and that’s how to manage and secure them. A cipher lock is a lock that is opened with a programmable keypad that is used to limit and control access to a highly sensitive area. Many organizations use cipher locks to control access…


Don’t let your company’s social media get hacked: Deploy Secret Server to end-users

July 1st, 2014

An innocent action performed by an Austrian teen recently affected the Twitter handles of BBC News and CNN accounts. He was experimenting with HTML when he exploited an open vulnerability in TweetDeck, Twitter’s social media management platform. Over 10.1 million of BBC News’s followers received a self-retweeting hack, in just seconds damaging the reputation of…


Video How-to: Customizing Your Company’s Secret Server

June 10th, 2014

If you follow our blog, you’ll know Secret Server version 8.6 includes a new user interface. This week, we’re bringing you a how-to video all about the theme roller. Jacob Stucky, UI Team Lead, walks you through the steps to customize Secret Server with your company’s theme. Theme Roller How-to  Basic Dashboard In addition to…


SSL: Beyond the Basics Part 4: Strict Transport Security

June 5th, 2014

In our previous post, we discussed SSL certificates and new cryptographic functionality that can be used with modern SSL certificates. Next, we are going to look at how to make sure SSL is always used for web clients in a browser. SSL doesn’t do much for securing browsers if it isn’t used, which is why…


SSL: Beyond the Basics Part 3: Certificates

May 22nd, 2014

In our previous post, we discussed configuring TLS cipher suites to maximize security by preferring newer, more secure ciphers and removing older ones where possible. For this post, we will take a closer look at different types of certificates that are used in HTTPS. The certificate is responsible for several different things when securing a…


Secret Server Disaster Recovery 101: Part 2

May 20th, 2014

So you’ve taken measures to protect and preserve your information. Now how do you restore it in a disaster? Part 2 of our Disaster Recovery series explains how you can quickly restore a working copy of Secret Server in the case that your primary instance of Secret Server fails. Note that the following steps assume…


SSL: Beyond the Basics Part 2: Ciphers

May 16th, 2014

In our previous post, we discussed the different protocols for SSL and TLS, and how we can improve security by disabling older, less secure protocols and enabling newer, more secure ones. Today, we will talk about ciphers, which is one of the key pieces to making these protocols work. Here’s a quick refresher: In daily…