<iframe src="//www.googletagmanager.com/ns.html?id=GTM-TR8PWW" height="0" width="0" style="display:none;visibility:hidden">
  • 45

    Anatomy of a Cyber Security Breach and The Second Law of Thermodynamics

    Continue Reading

     

  • 27

    Financial Security Crisis Looming in 2018...The Perfect Storm is Coming

    Continue Reading

     

Stay up to date

cybersecurity, identity and access management, encrypted channel monitoring

All Threats are Insider Threats
By Jonathan Lewis on June 13, 2014

Back in the day when the enterprise security model was a hardened perimeter protecting the internal "trusted" network, security vendors seized on the notion that businesses need protection...

Continue Reading

cryptoauditor, privileged identity management, encryption, identity and access management

Identity & Access Management: Don’t get Death Starred!
By John Walsh on May 28, 2014

Many things seem impenetrable until a “small vulnerability” is exploited. The phrase “small vulnerability” almost sounds like an oxymoron when you think about it.  Take the fable of one...

Continue Reading

cryptoauditor, key management, identity and access management

Invisible at Infosecurity Europe 2014? Definitely Not
By Shiho Hashimoto on May 8, 2014

The major tube strike that was conducted in London during the first two days of Infosecurity Europe 2014 didn’t seem to have had an impact on the visitors count. Held from April 30 to May 1...

Continue Reading

information security, privileged identity management, identity and access management

Privileged Users – Not Malicious But Still a Threat
By Jonathan Lewis on April 27, 2014

One of challenges security architects face is finding the right balance between security and end user convenience. This conflict is typified by the example of password policies. A too...

Continue Reading

key management, cybersecurity, encryption, identity and access management

SSH Communications Security Comments on Heartbleed Vulnerability
By Jason Thompson on April 10, 2014

Key Facts:  SSH Communications Security’s products are not affected by the Heartbleed flaw. Customers are advised to patch any server where the vulnerable OpenSSL software is installed. ...

Continue Reading

information security, identity and access management, iam, pcs

People Centered Security: Themes from The Gartner IAM Summit
By Jonathan Lewis on March 18, 2014

Growing up, we get a lot of conflicting advice. We are told  “look before you leap” but also “nothing ventured nothing gained”. The book of clichés is littered with other examples. The...

Continue Reading