<iframe src="//www.googletagmanager.com/ns.html?id=GTM-TR8PWW" height="0" width="0" style="display:none;visibility:hidden">
  • 45

    Anatomy of a Cyber Security Breach and The Second Law of Thermodynamics

    Continue Reading

     

  • 27

    Financial Security Crisis Looming in 2018...The Perfect Storm is Coming

    Continue Reading

     

Stay up to date

information security, key management, encryption, access controls, identity and access management, compliance, trusted access, Cloud Security, Business Flow, evolution of trusted access, encrypted channels, PAM, encrypted traffic monitoring, 3rd Party Access, ssh key management, WannaCry, phishing, breach, customer data, SSH keys, risk management, password, credential, payment systems, financial services, risk, trust, network security

Anatomy of a Cyber Security Breach and The Second Law of Thermodynamics
By Andrew Hammond on April 3, 2018

 

Continue Reading

information security, key management, cybersecurity, privileged identity management, identity and access management, compliance, universal ssh key manager, snowden, Privileged access management, SSH Communications Security, ssh key management, audit, Temporary Credentials, Short-Lived Credentials, breach, equifax, SSH keys, payment systems, exfiltration, financial services, risk, trust, network security, swift, GDPR, ISACA, ssh

Financial Security Crisis Looming in 2018...The Perfect Storm is Coming
By Andrew Hammond on November 21, 2017

"The wind and the waves are always on the side of the ablest navigator. -   Edmund Gibbon

Continue Reading

information security, cybersecurity, openssh, trusted access, Privileged access management, Privacy, breach, customer data, opensource, consumer data, SSH keys, wordpress, wordfence, honeypot, securityboulevard

Hackers Are Now Scanning For SSH Keys To Exploit
By John Walsh on October 24, 2017

As many of you know, servers running SSH are under constant siege by hackers and botnets, but how are attackers getting into these servers?  Servers are typically broken with...

Continue Reading

information security, key management, cybersecurity, privileged identity management, compliance, trusted access, Privileged access management, PAM, SSH Communications Security, easy button, SSH keys, risk management, password, certficate, credential

How To Fix Your Access Issues With One Button
By John Walsh on September 27, 2017

 

Continue Reading

information security, cybersecurity, trusted access, Privileged access management, Privacy, breach, customer data, equifax, opensource, consumer data

Equifax Learns a $Billion Lesson
By John Walsh on September 11, 2017

On Thursday, September 7th Equifax, one of the three major consumer credit reporting agencies, announced that hackers gained access to company data that impacts 143 million customers. ...

Continue Reading

Insider, information security, data loss prevention, cybersecurity, access controls, identity and access management, compliance, trusted access, Amazon Web Services, AWS, Cloud Security, DLP, Privileged access management, PAM, pci controls, 3rd Party Access, IoT, HIPPA, audit, cyber, protected data, WannaCry, phishing, SSHPsychos, Spear Phishing, Temporary Credentials, Short-Lived Credentials

A Cyberattack "Short Story"
By John Walsh on July 13, 2017

Written by; John Walsh

Continue Reading

cybersecurity, compliance, Privacy, audit, protected data

Privacy: Protect What Is Important
By Fouad Khalil on February 7, 2017

The concept of privacy has evolved over the years.  Looking back at recent history, privacy wasn’t really a big deal because only people who needed to know information about you were...

Continue Reading

compliance, universal ssh key manager, ssh key management, certificate management, hkma

Catch Up with the Coming Evolution: SSH Key and Certificate Management
By Ricky Ho on June 20, 2016

In mid May, SSH Communications Security participated to the Cyber Security Summit, organized by the Hong Kong Applied Science and Technology Research Institute and the Hong Kong Police...

Continue Reading

MobileID

MobileID found a new home at Titansoft
By Shiho Hashimoto on June 10, 2016

SSH Communications Security has announced that the MobileID authentication product line will move to Titansoft Oy, a new joint-venture company in which SSH Communications Security is a...

Continue Reading

cybersecurity, privileged identity management, identity and access management, compliance, audit

The never ending cycle: Cybersecurity, regulatory compliance & audit!
By Fouad Khalil on May 25, 2016

In my recent travels which spanned the globe and included stops in Hong Kong, Singapore and New Orleans, I had the pleasure and opportunity to network with a wide range of technology,...

Continue Reading