<iframe src="//www.googletagmanager.com/ns.html?id=GTM-TR8PWW" height="0" width="0" style="display:none;visibility:hidden">
  • 45

    Anatomy of a Cyber Security Breach and The Second Law of Thermodynamics

    Continue Reading

     

  • 27

    Financial Security Crisis Looming in 2018...The Perfect Storm is Coming

    Continue Reading

     

Stay up to date

cryptoauditor, universal ssh key manager, Smart Nation, MAS, third-party

Third-Party Access Management Fuels SSH Expansion in Southeast Asia
By Tommi Lampila on April 28, 2016

INTRODUCTION: The growing demand for our CryptoAuditor and Universal SSH Key Manager solutions prompted us to expand our footprint in Asia by opening an office in Singapore early this...

Continue Reading

access controls, compliance, ssh key management, HIPAA, healthcare, audit

OCR Phase II Audit Has Launched - Time To Get Access Under Control
By Fouad Khalil on March 31, 2016

I recently attended the 24th National HIPAA summit in Washington, DC and had the opportunity to mingle and catch up with my compliance peers. I walked away realizing that the...

Continue Reading

cryptoauditor, privileged identity management, encrypted channel monitoring, Cloud Security, Privileged access management, PAM, encrypted traffic monitoring, third-party

Cloud Users and Providers’ Security Needs?
By Ricky Ho on March 23, 2016

Cloud adoption is gaining momentum in Hong Kong, driven by both the governmental and private sectors. The rapidly growing cloud adoption does however pose some security concerns. How to,...

Continue Reading

cybersecurity, nist, compliance, Privileged access management

How are regulators & governing bodies taking on cybersecurity in 2016
By Fouad Khalil on March 15, 2016

A Little Bit of History (2014 – Today)  You don’t have to go back very far to discover common trends occurring across information security areas in all industries and government agencies...

Continue Reading

cryptoauditor, privileged identity management, encrypted channel monitoring, Cloud Security, Privileged access management, PAM, encrypted traffic monitoring, third-party

“Trust is good, but control is better” –  Thoughts concerning third-party privileged access in the cloud
By Rasa Siegberg on March 2, 2016

Internet sources cite Vladimir I. Lenin as the origin of the quote in the title. My history knowledge is not deep enough to tell what was the context of the utterance but I am rather...

Continue Reading

cryptoauditor, key management, privileged identity management, identity and access management, encrypted channel monitoring, universal ssh key manager, encrypted channels, Privileged access management, PAM

Shared Account Password and Key Management – Is There an Easier Way?
By Jussi Valkiainen on January 4, 2016

This blog is a continuation of my earlier blog “Plug and Play or Plug and Pain” on Privileged Access Management (PAM), posted on December 16, 2015. I will dive a bit deeper now into the...

Continue Reading

cryptoauditor, privileged identity management, encrypted channel monitoring, AWS, DLP, encrypted channels, Privileged access management, PAM, encrypted traffic monitoring

Plug and Play or Plug and Pain? How to Manage Privileged Access Effectively without Pain?
By Jussi Valkiainen on December 16, 2015

So you have a problem with privileged access? Whether it is your own employees accessing critical production systems on a daily basis, or third-party system vendors who need occasional...

Continue Reading

compliance, HIPPA, HITECH

HIPAA/HITECH! Another Tidal Wave – Does Anyone Remember Sarbanes-Oxley (SOX-404)?
By Fouad Khalil on November 20, 2015

Continue Reading

cryptoauditor, universal ssh key manager, APAC, Smart Nation, Smart City

Moving in the Right Direction in Secure Smart Nation and Cities
By Tommi Lampila on November 16, 2015

In October, SSH Communications Security joined two conferences in Singapore: GovernmentWare and Cloud Expo Asia. The hot topics at both events were around Smart Nation, aligning with...

Continue Reading

key management, nist, compliance, universal ssh key manager, trusted access, Tatu Ylönen

IT'S OFFICIAL - Security for Secure Shell Is A NIST Publication (7966)!!
By Fouad Khalil on November 3, 2015

In 1995 the Secure Shell (SSH) protocol was invented and it soon became the gold standard for data-in-transit security.  Today Secure Shell is one of the most widely used protocols in the...

Continue Reading