<iframe src="//www.googletagmanager.com/ns.html?id=GTM-TR8PWW" height="0" width="0" style="display:none;visibility:hidden">
  • 45

    Anatomy of a Cyber Security Breach and The Second Law of Thermodynamics

    Continue Reading

     

  • 27

    Financial Security Crisis Looming in 2018...The Perfect Storm is Coming

    Continue Reading

     

Stay up to date

key management, openssh

Secure Shell Support Coming To Windows
By Sami Pippuri on June 25, 2015

In early June, Microsoft announced something that surprised many; namely that they will be supporting Secure Shell (SSH) in their PowerShell tool used by many system administrators,...

Continue Reading

key management, gartner, identity and access management

Key rotation alone doesn’t solve our SSH user key problems
By Roman Hernandez on June 9, 2015

Breaches pertaining to SSH user keys are insidious. There are two primary reasons behind this. First, most organizations do not have comprehensive inventories of what trusts are valid for...

Continue Reading

cryptoauditor, key management, press

Day 1 of Infosecurity Europe conference is underway
By Sami Pippuri on June 2, 2015

Wow what a day it has been for our crew at Infosecurity Europe 2015! Our booth was ready to welcome visitors first thing in the morning, and throughout the day there was a steady stream of...

Continue Reading

key management, universal ssh key manager

You Control The Lock. The House Key Less So.
By Matthew McKenna on June 2, 2015

We’ve all been there: standing outside your home, you put your hand in your pocket, only to discover your house key is gone. Panic sets in.  Where is it? Did I leave it at work? Did it fall...

Continue Reading

cryptoauditor, privileged identity management, encrypted channel monitoring, press

North South East West People & Machines - Privileged Access Management for the Cloud Does Not Have to Be Painful
By Matthew McKenna on March 11, 2015

When considering privileged access management challenges organizations face today, you can simply spin around in circles considering all the angles that need to be considered from a...

Continue Reading

mainframe, tectia ssh

2015 - The Guardians of the Mainframe Legacy
By David Rivard on January 5, 2015

Another year has come and gone. For me, this is my 32nd anniversary in the IT field and the 21st in Security. Time has certainly flown by since punch cards, reel-to-reel tape, and thermal...

Continue Reading

cryptoauditor, data loss prevention, privileged identity management, encryption, encrypted channel monitoring

Cooler Heads Will Prevail
By Jussi Valkiainen on December 8, 2014

When thinking of IT security trends, I don’t think I would be on the wrong track if I would dub the year 2014 as “The Year of Open Source Vulnerability”. In the same vein, past couple of...

Continue Reading

key management, access controls, encrypted channel monitoring, compliance

Do You Fulfill Hong Kong Monetary Authority’s General Principles for Technology Risk Management?
By Tommi Lampila on November 27, 2014

The commencement of Shanghai-Hong Kong Stock Connect represents not only increasing cross-border trading, but also continuously growing data exchange between financial institutions such as...

Continue Reading

cryptoauditor, information security, privileged identity management, encryption, access controls, identity and access management, encrypted channel monitoring

A Video Is Worth a Million Words
By Jussi Valkiainen on November 11, 2014

It is a well-known fact that system administrators with root-level privileges have wider access to company’s critical information assets than the C-level executives. With great power comes...

Continue Reading

key management, access controls, identity and access management

[Infographic] 4 Steps to Secure Shell Key Management Bliss
By Jason Thompson on October 27, 2014

Secure Shell is an essential component in the day-to-day functions for many IT professionals. In fact, a recent Forrester study found 82% of organizations use Secure Shell and 68% consider...

Continue Reading