<iframe src="//www.googletagmanager.com/ns.html?id=GTM-TR8PWW" height="0" width="0" style="display:none;visibility:hidden">
  • 45

    Anatomy of a Cyber Security Breach and The Second Law of Thermodynamics

    Continue Reading

     

  • 27

    Financial Security Crisis Looming in 2018...The Perfect Storm is Coming

    Continue Reading

     

Stay up to date

cryptoauditor, information security, privileged identity management, encryption, access controls, identity and access management, encrypted channel monitoring

A Video Is Worth a Million Words
By Jussi Valkiainen on November 11, 2014

It is a well-known fact that system administrators with root-level privileges have wider access to company’s critical information assets than the C-level executives. With great power comes...

Continue Reading

cryptoauditor, privileged identity management, encryption, encrypted channel monitoring

Encrypted Highway to the Danger Zone
By Jason Thompson on August 15, 2014

Russian gangs, NSA vigilantes, and bleeding hearts – sounds like the groundwork for a cool, blockbuster movie. Unfortunately, this is the reality we now face.  According to Authentify, a...

Continue Reading

privileged identity management, pci dss, encrypted channel monitoring

With “Backoff” POS Malware, Attackers Use Your Security Tools Against You
By Jason Thompson on August 1, 2014

Yesterday the US Department of Homeland Security issued a warning to US businesses against a new POS malware attack called “Backoff”. The attackers are targeting common remote access...

Continue Reading

information security, privileged identity management, encryption, snowden

Snowden Calls On Employees To Leak Company Secrets
By John Walsh on July 23, 2014

During the Hackers On Planet Earth (HOPE) conference, Edward Snowden and Daniel Ellsberg called on insiders (employees) to spill corporate and government secrets.  Snowden is calling for...

Continue Reading

cryptoauditor, privileged identity management, encryption, identity and access management

Identity & Access Management: Don’t get Death Starred!
By John Walsh on May 28, 2014

Many things seem impenetrable until a “small vulnerability” is exploited. The phrase “small vulnerability” almost sounds like an oxymoron when you think about it.  Take the fable of one...

Continue Reading

key management, cybersecurity, privileged identity management, encryption, encrypted channel monitoring, openssh, heartbleed

Just A Heartbleed Away: The Dirty Little Secret in IT Security is Creating A Major Risk
By Jason Thompson on May 19, 2014

One of the major lessons learned from the Heartbleed Bug is just how vulnerable critical IT components, like encryption, are. The potential impact of these vulnerabilities can be severe and...

Continue Reading

information security, privileged identity management, identity and access management

Privileged Users – Not Malicious But Still a Threat
By Jonathan Lewis on April 27, 2014

One of challenges security architects face is finding the right balance between security and end user convenience. This conflict is typified by the example of password policies. A too...

Continue Reading

cryptoauditor, privileged identity management

Five Reasons Why You Should Monitor & Control [All of] Your Secure Shell Traffic
By Jason Thompson on April 4, 2014

How many times have we heard “the perimeter isn’t secure”? In fact, with BYOD, cloud and the extended enterprise, it’s hard to define what the perimeter is anymore.  The concept of a porous...

Continue Reading

cybersecurity, privileged identity management, encryption, encrypted channel monitoring, snowden

RSA Conference 2014 Wrap Up
By Jason Thompson on March 4, 2014

This year’s RSA Conference 2014 was filled with energy and great insights as well as controversy. Here are a few of the trends and topics that I saw at this year’s show. Energy: Encryption...

Continue Reading

key management, privileged identity management, encrypted channel monitoring

APT The Mask (aka Careto) Targets Secure Shell Keys
By Jonathan Lewis on February 11, 2014

Kaspersky Labs recently revealed the details of a sophisticated APT named “The Mask” or by its Spanish name “Careto”. The Mask is known to have infected at least 380 unique victims in over...

Continue Reading