<iframe src="//www.googletagmanager.com/ns.html?id=GTM-TR8PWW" height="0" width="0" style="display:none;visibility:hidden">
  • 45

    Anatomy of a Cyber Security Breach and The Second Law of Thermodynamics

    Continue Reading


  • 27

    Financial Security Crisis Looming in 2018...The Perfect Storm is Coming

    Continue Reading


Stay up to date

John Walsh

Director, Product Marketing John Walsh serves as director of product marketing at SSH Communications Security where he is focused on raising industry awareness of risk and compliance issues of unmanaged credentials. John has over 15 years of experience in the IT security industry, having held product management, product marketing, and software engineering positions at IBM and SSH Communications Security. He has led the launch of PrivX On-demand Access Manager product. Prior to joining the company, he worked at IBM where he obtained a patent, contributed to solutions guides, and designed a number of key software features for security products such as LDAP, Firewall, and Java Cryptography. John holds a BS in Computer Science from Binghamton University as well as an MS in Management Information Systems from Marist College. 

information security, cybersecurity, openssh, trusted access, Privileged access management, Privacy, breach, customer data, opensource, consumer data, SSH keys, wordpress, wordfence, honeypot, securityboulevard

Hackers Are Now Scanning For SSH Keys To Exploit
By John Walsh on October 24, 2017

As many of you know, servers running SSH are under constant siege by hackers and botnets, but how are attackers getting into these servers?  Servers are typically broken with...

Continue Reading

information security, key management, cybersecurity, privileged identity management, compliance, trusted access, Privileged access management, PAM, SSH Communications Security, easy button, SSH keys, risk management, password, certficate, credential

How To Fix Your Access Issues With One Button
By John Walsh on September 27, 2017


Continue Reading

information security, cybersecurity, trusted access, Privileged access management, Privacy, breach, customer data, equifax, opensource, consumer data

Equifax Learns a $Billion Lesson
By John Walsh on September 11, 2017

On Thursday, September 7th Equifax, one of the three major consumer credit reporting agencies, announced that hackers gained access to company data that impacts 143 million customers. ...

Continue Reading

Insider, information security, data loss prevention, cybersecurity, access controls, identity and access management, compliance, trusted access, Amazon Web Services, AWS, Cloud Security, DLP, Privileged access management, PAM, pci controls, 3rd Party Access, IoT, HIPPA, audit, cyber, protected data, WannaCry, phishing, SSHPsychos, Spear Phishing, Temporary Credentials, Short-Lived Credentials

A Cyberattack "Short Story"
By John Walsh on July 13, 2017

Written by; John Walsh

Continue Reading

information security, privileged identity management, encryption, snowden

Snowden Calls On Employees To Leak Company Secrets
By John Walsh on July 23, 2014

During the Hackers On Planet Earth (HOPE) conference, Edward Snowden and Daniel Ellsberg called on insiders (employees) to spill corporate and government secrets.  Snowden is calling for...

Continue Reading


Now Distributed People Can Stop Complaining About z/OS
By John Walsh on July 15, 2014

Many companies have a mix of distributed platforms and mainframes (z/OS) in their environment. Most distributed users do not understand z/OS too well and don’t want to, but they still have...

Continue Reading

cryptoauditor, privileged identity management, encryption, identity and access management

Identity & Access Management: Don’t get Death Starred!
By John Walsh on May 28, 2014

Many things seem impenetrable until a “small vulnerability” is exploited. The phrase “small vulnerability” almost sounds like an oxymoron when you think about it.  Take the fable of one...

Continue Reading

information security, openssl, openssh, press, heartbleed

Free Can Make You Bleed
By John Walsh on April 30, 2014

By now anyone concernedwith internet security has heard about the Heartbleed security vulnerability in OpenSSL.  What you may not be aware of is how much money and personal information is...

Continue Reading