<iframe src="//www.googletagmanager.com/ns.html?id=GTM-TR8PWW" height="0" width="0" style="display:none;visibility:hidden">
  • 45

    Anatomy of a Cyber Security Breach and The Second Law of Thermodynamics

    Continue Reading

     

  • 27

    Financial Security Crisis Looming in 2018...The Perfect Storm is Coming

    Continue Reading

     

Stay up to date

key management, access controls, encrypted channel monitoring, compliance

Do You Fulfill Hong Kong Monetary Authority’s General Principles for Technology Risk Management?
By Tommi Lampila on November 27, 2014

The commencement of Shanghai-Hong Kong Stock Connect represents not only increasing cross-border trading, but also continuously growing data exchange between financial institutions such as...

Continue Reading

key management, access controls, identity and access management

[Infographic] 4 Steps to Secure Shell Key Management Bliss
By Jason Thompson on October 27, 2014

Secure Shell is an essential component in the day-to-day functions for many IT professionals. In fact, a recent Forrester study found 82% of organizations use Secure Shell and 68% consider...

Continue Reading

key management, shellshock, heartbleed

Heartbleed and Shellshock – Different Vulnerabilities, Same Lesson
By Jonathan Lewis on October 1, 2014

Just last month we hosted a webinar called “Heartbleed – You Stopped the Bleeding but Did You Fix the Problem?”. Heartbleed allows an attacker to retrieve the contents of memory from...

Continue Reading

key management, pci dss, universal ssh key manager

Black Blob of Death Threatens Data Center Security
By Jason Thompson on August 18, 2014

Researchers at SSH Communications Security recently uncovered a serious security vulnerability that impacts data centers in the vast majority of banks and financial institutions. Okay, so...

Continue Reading

key management, encryption, openssl, openssh, heartbleed

Is Open Source Right for You? Apparently Google Thinks Not
By Jason Thompson on July 24, 2014

Heartbleed woke everyone up to the risks that open source software can pose if the management, development and design of the software isn’t up to par. Earlier this month OpenSSL released a...

Continue Reading

mainframe, key management, identity and access management

The Mainframe and IDM
By David Rivard on July 6, 2014

Identity Management Projects always result in lower costs and Streamlined Security Administration. Where have you heard that one before? Since the mid 1990's there has been a talent drain...

Continue Reading

key management, openssh, universal ssh key manager

Backdoor SSH Root Key Snafus Much More Common Than You Think
By Jason Thompson on July 3, 2014

It appears as though a hard-wired Secure Shell private key has created a bit of a kerfuffle for folks running Cisco's VoIP manager. This one made it in the headlines but because the...

Continue Reading

key management, cybersecurity, privileged identity management, encryption, encrypted channel monitoring, openssh, heartbleed

Just A Heartbleed Away: The Dirty Little Secret in IT Security is Creating A Major Risk
By Jason Thompson on May 19, 2014

One of the major lessons learned from the Heartbleed Bug is just how vulnerable critical IT components, like encryption, are. The potential impact of these vulnerabilities can be severe and...

Continue Reading

cryptoauditor, key management, identity and access management

Invisible at Infosecurity Europe 2014? Definitely Not
By Shiho Hashimoto on May 8, 2014

The major tube strike that was conducted in London during the first two days of Infosecurity Europe 2014 didn’t seem to have had an impact on the visitors count. Held from April 30 to May 1...

Continue Reading

key management, cybersecurity, encryption, identity and access management

SSH Communications Security Comments on Heartbleed Vulnerability
By Jason Thompson on April 10, 2014

Key Facts:  SSH Communications Security’s products are not affected by the Heartbleed flaw. Customers are advised to patch any server where the vulnerable OpenSSL software is installed. ...

Continue Reading