+1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication


Filter by Tags: 

Posts Tagged ‘Education’

Cyber Security Awareness Month: Cyber Security in the Workplace is Everyone’s Responsibility

October 10th, 2017

Cyber security is no longer just a technology challenge—it’s a challenge for everybody who uses and interacts with technology daily. That means: everybody in your organization. Cyber security is no longer just the responsibility of the IT department The protection and security of employees’ work and personal lives are no longer separate. They have been…

Come to our 3rd annual UNLOCKED conference in Washington, DC this October

July 7th, 2017

Thycotic is hosting our 3rd annual UNLOCKED conference in Washington, DC this October, and we want YOU to join us! Here are the top 5 reasons you should attend. 1. Get your hands dirty The best way to learn is to do it yourself, right? Especially when you can try new things and not worry…

How Does Encryption Work? A Look at Symmetric and Asymmetric Encryption

June 12th, 2017

Today we're talking about encryption, but not salting or hashing, even though the two are often associated with one another when storing things like passwords in a secure manner. They are actually very different, and this post focuses on encryption. A Quick Overview of Encryption Encryption is a method of turning data into a form…

An Introduction to Business Networks 101

June 2nd, 2017

If you’re exploring getting into network administration, either for your personal education (such as a college degree) or as a career change, you’re in the right place.  When it comes to understanding the more complex aspects of network administration, such as cyber security, it’s best to start at the beginning. In order to learn how…

FERPA tells you what, but not how: The first step to being compliant today

April 26th, 2017

In the 1970s the US Government introduced the Family Education Rights and Privacy Act (FERPA).  In short, the act provides guidelines and regulations for when and how an academic institute can share student/parent records with those record owners and 3rd parties.  Much like other regulations (such as HIPAA and PCI), technology continues to have a…

A Cloud-First Strategy

March 14th, 2017

Guest column by Mike Somerville originally posted on Ed TechDigest on February 16, 2017 As Manager of Systems Support and Chief Cloud Evangelist, I lead the IT systems team at the University of San Diego. We’re responsible for four data centers, the network, virtualization, servers, and more—everything that needs a password for access. Automating Privileged…