<iframe src="//www.googletagmanager.com/ns.html?id=GTM-TR8PWW" height="0" width="0" style="display:none;visibility:hidden">
  • 45

    Anatomy of a Cyber Security Breach and The Second Law of Thermodynamics

    Continue Reading

     

  • 27

    Financial Security Crisis Looming in 2018...The Perfect Storm is Coming

    Continue Reading

     

Stay up to date

Interview with SSH's new CEO, Harri Koponen
By Shiho Hashimoto on October 14, 2014

Harri Koponen, 51, eMBA, Dr. Econ. (h.c.), joined SSH at the beginning of October as our new CEO. I took a few minutes of his time to hear where he comes from, what his views are on the...

Continue Reading

information security, data loss prevention, access controls, compliance

Potential Pitfalls of MAS TRM Guidelines
By Tommi Lampila on October 7, 2014

Monetary Authority of Singapore (MAS) revised its Technology Risk Management Guidelines (TRM) in June 2013. Financial Institutions (FI) operating in Singapore have since been reviewing the...

Continue Reading

key management, shellshock, heartbleed

Heartbleed and Shellshock – Different Vulnerabilities, Same Lesson
By Jonathan Lewis on October 1, 2014

Just last month we hosted a webinar called “Heartbleed – You Stopped the Bleeding but Did You Fix the Problem?”. Heartbleed allows an attacker to retrieve the contents of memory from...

Continue Reading

ukm product updates, universal ssh key manager

Elliptic Curves and More: Universal SSH Key Manager Version 1.3.3
By Roman Hernandez on September 7, 2014

The latest version of Universal SSH Key Manager brings an important update: support for elliptic curve cryptography (ECC) keys. If you’re not familiar with ECC, suffice it to say that it’s...

Continue Reading

nist, press

Heads Up for Federal CISOs and CIOs: NIST Publishes Guidelines for SSH Key Management
By Jonathan Lewis on August 20, 2014

For those of us who follow the activities of NIST, yesterday marked the arrival of a remarkable document with a characteristically bland NIST-style title:  “Security of Automated Access...

Continue Reading

key management, pci dss, universal ssh key manager

Black Blob of Death Threatens Data Center Security
By Jason Thompson on August 18, 2014

Researchers at SSH Communications Security recently uncovered a serious security vulnerability that impacts data centers in the vast majority of banks and financial institutions. Okay, so...

Continue Reading

cryptoauditor, privileged identity management, encryption, encrypted channel monitoring

Encrypted Highway to the Danger Zone
By Jason Thompson on August 15, 2014

Russian gangs, NSA vigilantes, and bleeding hearts – sounds like the groundwork for a cool, blockbuster movie. Unfortunately, this is the reality we now face.  According to Authentify, a...

Continue Reading

privileged identity management, pci dss, encrypted channel monitoring

With “Backoff” POS Malware, Attackers Use Your Security Tools Against You
By Jason Thompson on August 1, 2014

Yesterday the US Department of Homeland Security issued a warning to US businesses against a new POS malware attack called “Backoff”. The attackers are targeting common remote access...

Continue Reading

key management, encryption, openssl, openssh, heartbleed

Is Open Source Right for You? Apparently Google Thinks Not
By Jason Thompson on July 24, 2014

Heartbleed woke everyone up to the risks that open source software can pose if the management, development and design of the software isn’t up to par. Earlier this month OpenSSL released a...

Continue Reading

information security, privileged identity management, encryption, snowden

Snowden Calls On Employees To Leak Company Secrets
By John Walsh on July 23, 2014

During the Hackers On Planet Earth (HOPE) conference, Edward Snowden and Daniel Ellsberg called on insiders (employees) to spill corporate and government secrets.  Snowden is calling for...

Continue Reading