+1-202-802-9399 U.S. Headquarters

Thycotic’s Cybersecurity Publication

Ransomware goes into stealth mode: 7 things you can do to protect yourself

Ransomware is a destructive variant of malicious malware. It makes critical systems and sensitive information inaccessible until a ransom is paid. Ransom is typically demanded in bitcoin with a 72 hour window to pay before the key is deleted and data is irreversibly lost. Now, it has evolved. Here’s how you protect your organization from the losses suffered in a ransomware attack.

Filter by Tags: 

Could Pokémon Go be the largest surveillance app yet?

August 2nd, 2016

Access to location information, your camera, your photo’s and your email all in one simple app download. Computer Gaming has always been a way to lure people to downloading a so called free app which comes bundled with malware either to use your computer for malicious activity or to steal your data for cyber crime […]

Top 5 Tips to Nail Your Thycotic Job Application

July 20th, 2016

Want to make a great first impression? We hand select the top talent from across the globe. If you think you have what it takes, follow these 5 tips to nail your Thycotic interview and get one step closer to joining our awesome team! 1.       Know your stuff –and show you’re willing to learn what you [...]

Integration Spotlight: Enhanced Security with Credentialed Vulnerability Assessments with Tenable

July 7th, 2016

Organizations today are only barely scratching the surface when it comes to vulnerability assessments with unauthenticated scans. Unauthenticated scans still leave many unknowns that leave your organization vulnerable to attack. Credentialed Vulnerability Assessments Made Easy We are excited to announce our partnership and integration between Nessus® Cloud and Nessus® Manager with Thycotic Secret Server. The [...]

Discover the scale of your privileged account risk

July 5th, 2016

Guest post from Alpha Generation a Thycotic certified partner who specializes in IT distribution with a focus on proactive security in the UK. Privileged accounts are a risk for IT security. Most of us know that already – there’s just no avoiding the facts. Facts like: 45% of hackers say privileged passwords are their most coveted target [...]

RECAP: UNLOCKED Conference 2016’s Top Moments

June 28th, 2016

We want to thank our attendees for being a valuable part of UNLOCKED 2016! UNLOCKED 2016, Thycotic’s second annual user conference, just came to a close, and here at Thycotic we’re already brimming with ideas on how to make UNLOCKED 2017 even more valuable for our users! We appreciate all of the great feedback we received [...]

Using Secret Server as Proactive Security Defense at Saab

June 21st, 2016

As vice president and CIO at Saab Defense and Security USA LLC, Per Hammarin manages a 10 member IT team in Washington, DC which is part of a parent organization based in Sweden.  Over more than 30 years and progressive positions within the civil aircraft and defense subsidiary of the company known for its iconic [...]

Ransomware as a Service- The Dark Side Has a Platform Too

June 14th, 2016

You’d think that by now we’d be pretty savvy, that anti-virus software would protect us, or at least warn us about suspicious links that we’ve been invited to click on. And who doesn’t know that downloading files from unknown sources is a no-no? We all do. But people, even smart people, do it every day. [...]

10 Questions the Board of Directors Should Ask About Cybersecurity

June 7th, 2016

Corporate directors play an important role in ensuring their companies have sufficient policies and resources in place to address IT security and to respond in the event that the company suffers a cyber-attack. Board of directors should demand to receive appropriate and timely information to help them fulfill their oversight role in managing cyber risk. [...]

Privileged Passwords and PCI-Compliance

June 2nd, 2016

Guest post from Alpha Generation a Thycotic certified partner who specializes in IT distribution with a focus on proactive security in the UK. Anyone that handles payment card data is affected, so most of us have heard of the Payment Card Industry Data Security Standard (PCI-DSS). It establishes key expectations for protecting cardholder data, whether you’re handling [...]

How Security Can Make IT More Productive

May 31st, 2016

Recently, IDC posed the question “Can Security Make IT More Productive”? In their Technology Spotlight, IDC examined issues around security and the undergoing transformation from negative to positive and from obstructionist to an enablement role. The paper also highlighted how Thycotic solutions play in addressing associated challenges. According to IDC, Privileged Access Management (PAM) is [...]