<iframe src="//www.googletagmanager.com/ns.html?id=GTM-TR8PWW" height="0" width="0" style="display:none;visibility:hidden">
  • 45

    Anatomy of a Cyber Security Breach and The Second Law of Thermodynamics

    Continue Reading

     

  • 27

    Financial Security Crisis Looming in 2018...The Perfect Storm is Coming

    Continue Reading

     

Stay up to date

Jonathan Lewis

Director of Product MarketingJonathan Lewis serves as director of product marketing at SSH Communications Security where he is focused on raising industry awareness of risk and compliance issues of unmanaged Secure Shell identities. Jonathan has over 15 years of experience in the IT security industry, having held product management and product marketing positions at Nortel, Arbor Networks, Compaq and Digital Equipment Corporation. He has led the launch of numerous security products including IPsec and SSL VPNs, end point security products and firewalls. Jonathan holds a BS and MS from McGill University as well as an MBA from Bentley University.

key management, shellshock, heartbleed

Heartbleed and Shellshock – Different Vulnerabilities, Same Lesson
By Jonathan Lewis on October 1, 2014

Just last month we hosted a webinar called “Heartbleed – You Stopped the Bleeding but Did You Fix the Problem?”. Heartbleed allows an attacker to retrieve the contents of memory from...

Continue Reading

nist, press

Heads Up for Federal CISOs and CIOs: NIST Publishes Guidelines for SSH Key Management
By Jonathan Lewis on August 20, 2014

For those of us who follow the activities of NIST, yesterday marked the arrival of a remarkable document with a characteristically bland NIST-style title:  “Security of Automated Access...

Continue Reading

cybersecurity, identity and access management, encrypted channel monitoring

All Threats are Insider Threats
By Jonathan Lewis on June 13, 2014

Back in the day when the enterprise security model was a hardened perimeter protecting the internal "trusted" network, security vendors seized on the notion that businesses need protection...

Continue Reading

information security, privileged identity management, identity and access management

Privileged Users – Not Malicious But Still a Threat
By Jonathan Lewis on April 27, 2014

One of challenges security architects face is finding the right balance between security and end user convenience. This conflict is typified by the example of password policies. A too...

Continue Reading

information security, identity and access management, iam, pcs

People Centered Security: Themes from The Gartner IAM Summit
By Jonathan Lewis on March 18, 2014

Growing up, we get a lot of conflicting advice. We are told  “look before you leap” but also “nothing ventured nothing gained”. The book of clichés is littered with other examples. The...

Continue Reading

key management, privileged identity management, encrypted channel monitoring

APT The Mask (aka Careto) Targets Secure Shell Keys
By Jonathan Lewis on February 11, 2014

Kaspersky Labs recently revealed the details of a sophisticated APT named “The Mask” or by its Spanish name “Careto”. The Mask is known to have infected at least 380 unique victims in over...

Continue Reading