<iframe src="//www.googletagmanager.com/ns.html?id=GTM-TR8PWW" height="0" width="0" style="display:none;visibility:hidden">
  • 45

    Anatomy of a Cyber Security Breach and The Second Law of Thermodynamics

    Continue Reading

     

  • 27

    Financial Security Crisis Looming in 2018...The Perfect Storm is Coming

    Continue Reading

     

Stay up to date

key management, cybersecurity, privileged identity management, encryption, encrypted channel monitoring, openssh, heartbleed

Just A Heartbleed Away: The Dirty Little Secret in IT Security is Creating A Major Risk
By Jason Thompson on May 19, 2014

One of the major lessons learned from the Heartbleed Bug is just how vulnerable critical IT components, like encryption, are. The potential impact of these vulnerabilities can be severe and...

Continue Reading

key management, cybersecurity, encryption, identity and access management

SSH Communications Security Comments on Heartbleed Vulnerability
By Jason Thompson on April 10, 2014

Key Facts:  SSH Communications Security’s products are not affected by the Heartbleed flaw. Customers are advised to patch any server where the vulnerable OpenSSL software is installed. ...

Continue Reading

cybersecurity, privileged identity management, encryption, encrypted channel monitoring, snowden

RSA Conference 2014 Wrap Up
By Jason Thompson on March 4, 2014

This year’s RSA Conference 2014 was filled with energy and great insights as well as controversy. Here are a few of the trends and topics that I saw at this year’s show. Energy: Encryption...

Continue Reading

cybersecurity, snowden

Warfare on the Virtual Battlefield
By Jason Thompson on February 9, 2014

At last year’s Gartner Risk Management Conference in the DC metro area, I attended a seminar where some of Gartner’s analysts were looking out on the horizon – 2020 to be exact – to give...

Continue Reading