Brian Chiu

Folder Permissions
Assign Folder permission to different users in Secret Server.
LEARN MORE
Finding Secrets
Learn how to find specific secrets in Secret Server.
LEARN MORE
Creating Secrets
Learn how to create a secret in Secret Server.
LEARN MORE
Infrastructure as Code
Self-service infrastructure as code supporting flexible, secure, and temporary cloud environments.
LEARN MORE
How to Prevent a Ransomware Attack
Ransomware is a type of malware used by threat actors to infect computers and encrypt computer files, until a ransom is paid. After the initial infection, ransomware will attempt to…
LEARN MORE
Are you vulnerable to a Cyberattack
In the U.S. a data breach costs a company on average $8.19 million.
LEARN MORE
Is your Cybersecurity Strategy Scalable 
Cybersecurity is like a house. The coding is the blueprint and mainframe of the house. The different rooms could be seen as different departments. Every room has a locked door that needs…
LEARN MORE
Digital Transformation and Cybersecurity go hand in hand
Many companies are starting to see the importance of implementing a digital transformation strategy. The reasoning behind implementing digital transformation could be for improved customer experience, workforce enablement, or one…
LEARN MORE
28 Oct, 2021
5 Tips on how to pick the right Cybersecurity Software Provider
Cybersecurity is an integral part of any business and picking the right provider is not easy. There are many things to consider when looking for a vendor. In order to…
LEARN MORE
Assigning Secret Policies
A video discussing how to assign secret policies within Thycotic Secret Server
LEARN MORE