+1-202-802-9399 (US)

Thycotic’s CyberSecurity Publication

POPULAR CATEGORIES

Filter by Tags: 

Posts Tagged ‘For IT Admins’

(SSH) Keys to Unix Security

October 9th, 2018

Root accounts are the keys to powerful IT systems, the backbone of your entire infrastructure. They use privileged credentials to control shell access, file transfers, or batch jobs that communicate with other computers or apps, often accessed remotely, with local configuration. They can be the trickiest of all types of privileged accounts to secure, particularly…


Ostriches, Zero Day Exploits, and the Elusive CyberSec Expert: Why SMBs Should Implement Cloud-Based PAM

October 2nd, 2018

Small and medium-sized businesses (SMBs) face a cyber security trifecta. Cyber criminals are increasingly targeting the most vulnerable businesses (not just the biggest fish). Sophisticated attackers quickly take advantage of newly revealed vulnerabilities. And, cyber security professionals are in short supply. Maybe SMBs aren’t aware that they can use the same types of security systems…


Top 5 Ways to Win your CEO/CTOs Heart

February 13th, 2018

In today’s always-connected world it’s important to realize that, historically and traditionally, cybersecurity was the responsibility of the IT department. Any time a cyber incident or data breach occurred or security questions arose, these got deferred to IT for the answers. Failure to translate cyber risk into business risk has left many businesses clueless But…


The Lockdown’s 10 Most Popular Blogs of 2017

January 10th, 2018

2017 was a record year for cyber security with breaches and hacks making headlines just about every day.  Thank you for following along with the 2017 chaos as we captured the biggest breaches, security nightmares, and attacks. As a recap, here are the “Top 10” posts from the blog, sorted in increasing order based on readership. Let the countdown begin! #10: How…


5 Free Encryption Tools You Can Use Today to Protect Yourself!

January 3rd, 2018

Author Note:  These are all 3rd party tools that have been recommended to me by peers and experts in the field.  With that said, Thycotic does NOT endorse any of these: please explore and use at your own risk.  Email Encryption Tool OpenPGP – An open source encryption protocol used by many clients for providing…


Stop storing cleartext credentials in the registry for Point of Sale systems

November 30th, 2017

Do you want to enable auto logon on your PoS systems without compromise? Do you need to enable auto logon for a seamless buying experience for your customers, but you’re doing it in an unsecure way? Well, Thycotic’s Secret Server has the answer, with complete automation, and without storing credentials in cleartext. Let’s talk about…


What is PuTTY and what’s new with it in 2017?

September 7th, 2017

  What is PuTTY? PuTTY is an open source application that allows you to connect remotely to many different types of systems, over various communication protocols.  However, PuTTY is most famously used for SSH connects from Windows systems to Unix based systems.  This application allows you to connect your private SSH keys and enter passphrases…


The Top 5 PAM Tasks IT Teams Must Automate Part 5: Compliance Reporting

July 19th, 2017

Automating Compliance Reporting: When privileged account management tasks are being done manually, compliance reporting gets complicated. Yet many organizations must demonstrate compliance and provide evidence to auditors and other reviewing bodies to prove that security policy requirements are being met. In this 5-part Thycotic educational series, we focus on five areas of Privileged Account Management…


The Tide is Turning for Privileged Account Management and Security

July 14th, 2017

CyberArk’s latest preliminary earning report and investor reactions show they’re starting to lose sight on what the market is looking for. For years CyberArk has been the biggest and, in many cases, the only player in the Privileged Account Management space.  When you’re one of the first to market, it gives you a lot of…


SysAdmin Day 2017 is almost here! Choose your bumper sticker now.

July 7th, 2017

Join us in celebrating the best day of the year—System Administrator Appreciation Day 2017! The official SysAdmin Day day isn’t until the 28th – the last Friday of July. But we want to make sure that every sysadmin gets a little thank you from our team. Let’s face it, 364 days out of the year…