+1-202-802-9399 U.S. Headquarters

Thycotic’s Cybersecurity Publication

FEATURED STORY:
5 Shocking Insights into the Social Network Habits of Security Professionals 

Hacking social media accounts has never been easier. Attackers take advantage of poor password hygiene and usually hijack an account and hold it for ransom. It’s difficult to get the real picture, but according to Facebook, accounts are hacked 600,000 times a day. And even worse, 80% of all cyber security attacks involve a weak or stolen password.

Filter by Tags: 

The Top 5 PAM Tasks IT Teams Must Automate Part 4: SSH Key Management

July 5th, 2017

Automating SSH Key Management: Management of SSH keys can be tough, especially if best practices require the keys to be updated periodically, or when someone who possesses some of the keys leaves the company. Manual management is a daunting task, yet many SSH key management tools are limited in their capabilities. In this 5-part Thycotic…


The Top 5 PAM Tasks IT Teams Must Automate Part 3: Team Password Sharing

June 22nd, 2017

Automating Team Password Sharing: Sharing access to admin accounts across an organization is a challenge. But with proper automation in place your users know exactly what systems they can access and which accounts they can use to access those systems—a proverbial “one-stop shop” to conduct their work fast and securely. In this 5-part Thycotic educational…


The Top 5 PAM Tasks IT Teams Must Automate Part 2: Changing Network Passwords

June 21st, 2017

Automating Network Password Changing: A password that remains the same year in and year out is a hacker’s dream, and a breach waiting to happen. Fortunately, there are tools that can force users to change passwords after a set period of time, and can automate password changing to protect privileged accounts. In this 5-part Thycotic…


The Top 5 PAM Tasks IT Teams Must Automate Part 1: Privileged Account Discovery

June 16th, 2017

Automating Privileged Account Discovery: The first rule of Information Security says, “You can’t protect what you don’t know you have.” In other words, you could be harboring a hacker as we speak. Let’s examine how automation can be used to discover, catalog and protect the privileged accounts on your network. In this 5-part Thycotic educational…


How Does Encryption Work?

June 12th, 2017

Before we get started, I want to call out something very specific. We are going to cover encryption today, and not salting or hashing.  These are two different things that are often associated together when storing things like passwords in a secure manner.  A Quick Overview of Encryption Encryption at its core basis is a…


Security: Powered by People

June 8th, 2017

Guest column by SailPoint. Author: Juliette Rizkallah The acceleration of cloud adoption is gaining more traction each day. If we’ve said it once, we’ve said it a thousand times, cloud is where the majority of enterprises are headed. It’s more than just your employees who are using the cloud to get things done; the cloud connects…


Part 3: How did my password get hacked? It’s this easy…

June 6th, 2017

This is the 3rd part in a 3-part series on how hackers are using simple methods to steal your passwords. In part 1 we talked about how hackers used passwords that were discovered in a previous breach in order to attempt a secondary breach. In part 2 we talked about the use of malicious scripts…


An Introduction to Business Networks 101

June 2nd, 2017

If you’re exploring getting into network administration, either for your personal education (such as a college degree) or as a career change, you’re in the right place.  When it comes to understanding the more complex aspects of network administration, such as cyber security, it’s best to start at the beginning. In order to learn how…


The Pros and Cons of Frequent Password Rotation

May 31st, 2017

What this title really should say is “the cons and cons of frequent manual password rotation”.  To be honest, I can’t think of a single good reason why anyone should be subjected to frequent manual password rotations.  There is nothing about that concept that screams “Good Idea”. Now, before you run off let me explain.…


5 Shocking Insights into the Social Network Habits of Security Professionals

May 30th, 2017

It may come to a shock for some of you, but not all security professionals practice what they preach. In a recent survey, the “real” truth came to light around cyber security professionals and their security habits around social media usage. Hacking social media accounts has never been easier. Attackers take advantage of poor password…