<iframe src="//www.googletagmanager.com/ns.html?id=GTM-TR8PWW" height="0" width="0" style="display:none;visibility:hidden">

SSH.COM Blog

Blog

Subscribe to Email Updates

We promise to send you awesome stuff you'll want to read more than once.

Staff Writer

Staff writer at SSH.COM
Find Staff Writer on:

Posts By Staff Writer

February 07, 2017

Privacy: Protect What Is Important

compliance cybersecurity audit

The concept of privacy has evolved over the years.  Looking back at recent history, privacy wasn’t really a big deal because only people who needed to know information about you were privy to your per...

June 10, 2016

MobileID found a new home at Titansoft

MobileID

SSH Communications Security has announced that the MobileID authentication product line will move to Titansoft Oy, a new joint-venture company in which SSH Communications Security is a shareholder. Th...

May 25, 2016

The never ending cycle: Cybersecurity, regulatory ...

compliance identity and access management Privileged Identity Management cybersecurity audit

In my recent travels which spanned the globe and included stops in Hong Kong, Singapore and New Orleans, I had the pleasure and opportunity to network with a wide range of technology, security and aud...

March 31, 2016

OCR Phase II Audit Has Launched - Time To Get Acce...

secure access compliance SSH Key management HIPAA healthcare audit

I recently attended the 24th National HIPAA summit in Washington, DC and had the opportunity to mingle and catch up with my compliance peers. I walked away realizing that the HIPAA/HITECH compliance t...

March 15, 2016

How are regulators & governing bodies taking on cy...

cybersecurity NIST compliance Privileged Access Management

A Little Bit of History (2014 – Today)  You don’t have to go back very far to discover common trends occurring across information security areas in all industries and government agencies as they relat...

March 02, 2016

“Trust is good, but control is better” –  Thoughts...

CryptoAuditor Privileged Identity Management encrypted channel monitoring cloud security Privileged Access Management PAM encrypted traffic

Internet sources cite Vladimir I. Lenin as the origin of the quote in the title. My history knowledge is not deep enough to tell what was the context of the utterance but I am rather certain that the ...

November 20, 2015

HIPAA/HITECH! Another Tidal Wave – Does Anyone Rem...

compliance HIPAA

November 03, 2015

IT'S OFFICIAL - Security for Secure Shell Is A NIS...

NIST compliance Universal SSH Key Manager trusted access Tatu Ylönen

In 1995 the Secure Shell (SSH) protocol was invented and it soon became the gold standard for data-in-transit security.  Today Secure Shell is one of the most widely used protocols in the world.  In a...

September 25, 2015

Assess Your PCI Compliance Before a QSA does!

PCI DSS

As with any compliance framework we face, and we know many exist today, it is best we assess our state of compliance before an auditor arrives at the proverbial door.  PCI DSS is one framework many pa...

September 15, 2015

Introducing the Universal SSH Key Manager applianc...

UKM Universal SSH Key Manager

Enterprises often have more Secure Shell identities than employees, and just as with employees, there must be a central management entity tasked with oversight of those identities.

Book the demo

Author

OPT IN for our newsletter

To be honest, we don’t do much outbound marketing. So if you give us your email, we’re unlikely to spam you.

Subscribe to Email Updates

Want to know more about SSH.COM solutions?

We design best-of-breed commercial solutions for secure access that help our customers win in the global data economy.

Read more about our solutions

Related posts from the SSH.COM blog