<iframe src="//www.googletagmanager.com/ns.html?id=GTM-TR8PWW" height="0" width="0" style="display:none;visibility:hidden">
  • 45

    Anatomy of a Cyber Security Breach and The Second Law of Thermodynamics

    Continue Reading

     

  • 27

    Financial Security Crisis Looming in 2018...The Perfect Storm is Coming

    Continue Reading

     

Stay up to date

Jason Thompson

Former Vice President of Worldwide Marketing Jason served as Vice President of Worldwide Marketing until October 2014.

key management, access controls, identity and access management

[Infographic] 4 Steps to Secure Shell Key Management Bliss
By Jason Thompson on October 27, 2014

Secure Shell is an essential component in the day-to-day functions for many IT professionals. In fact, a recent Forrester study found 82% of organizations use Secure Shell and 68% consider...

Continue Reading

key management, pci dss, universal ssh key manager

Black Blob of Death Threatens Data Center Security
By Jason Thompson on August 18, 2014

Researchers at SSH Communications Security recently uncovered a serious security vulnerability that impacts data centers in the vast majority of banks and financial institutions. Okay, so...

Continue Reading

cryptoauditor, privileged identity management, encryption, encrypted channel monitoring

Encrypted Highway to the Danger Zone
By Jason Thompson on August 15, 2014

Russian gangs, NSA vigilantes, and bleeding hearts – sounds like the groundwork for a cool, blockbuster movie. Unfortunately, this is the reality we now face.  According to Authentify, a...

Continue Reading

privileged identity management, pci dss, encrypted channel monitoring

With “Backoff” POS Malware, Attackers Use Your Security Tools Against You
By Jason Thompson on August 1, 2014

Yesterday the US Department of Homeland Security issued a warning to US businesses against a new POS malware attack called “Backoff”. The attackers are targeting common remote access...

Continue Reading

key management, encryption, openssl, openssh, heartbleed

Is Open Source Right for You? Apparently Google Thinks Not
By Jason Thompson on July 24, 2014

Heartbleed woke everyone up to the risks that open source software can pose if the management, development and design of the software isn’t up to par. Earlier this month OpenSSL released a...

Continue Reading

key management, openssh, universal ssh key manager

Backdoor SSH Root Key Snafus Much More Common Than You Think
By Jason Thompson on July 3, 2014

It appears as though a hard-wired Secure Shell private key has created a bit of a kerfuffle for folks running Cisco's VoIP manager. This one made it in the headlines but because the...

Continue Reading

key management, cybersecurity, privileged identity management, encryption, encrypted channel monitoring, openssh, heartbleed

Just A Heartbleed Away: The Dirty Little Secret in IT Security is Creating A Major Risk
By Jason Thompson on May 19, 2014

One of the major lessons learned from the Heartbleed Bug is just how vulnerable critical IT components, like encryption, are. The potential impact of these vulnerabilities can be severe and...

Continue Reading

key management, cybersecurity, encryption, identity and access management

SSH Communications Security Comments on Heartbleed Vulnerability
By Jason Thompson on April 10, 2014

Key Facts:  SSH Communications Security’s products are not affected by the Heartbleed flaw. Customers are advised to patch any server where the vulnerable OpenSSL software is installed. ...

Continue Reading

cryptoauditor, privileged identity management

Five Reasons Why You Should Monitor & Control [All of] Your Secure Shell Traffic
By Jason Thompson on April 4, 2014

How many times have we heard “the perimeter isn’t secure”? In fact, with BYOD, cloud and the extended enterprise, it’s hard to define what the perimeter is anymore.  The concept of a porous...

Continue Reading

cybersecurity, privileged identity management, encryption, encrypted channel monitoring, snowden

RSA Conference 2014 Wrap Up
By Jason Thompson on March 4, 2014

This year’s RSA Conference 2014 was filled with energy and great insights as well as controversy. Here are a few of the trends and topics that I saw at this year’s show. Energy: Encryption...

Continue Reading