<iframe src="//www.googletagmanager.com/ns.html?id=GTM-TR8PWW" height="0" width="0" style="display:none;visibility:hidden">
  • 45

    Anatomy of a Cyber Security Breach and The Second Law of Thermodynamics

    Continue Reading

     

  • 27

    Financial Security Crisis Looming in 2018...The Perfect Storm is Coming

    Continue Reading

     

Stay up to date

information security, key management, cybersecurity, privileged identity management, identity and access management, compliance, universal ssh key manager, snowden, Privileged access management, SSH Communications Security, ssh key management, audit, Temporary Credentials, Short-Lived Credentials, breach, equifax, SSH keys, payment systems, exfiltration, financial services, risk, trust, network security, swift, GDPR, ISACA, ssh

Financial Security Crisis Looming in 2018...The Perfect Storm is Coming
By Andrew Hammond on November 21, 2017

"The wind and the waves are always on the side of the ablest navigator. -   Edmund Gibbon

Continue Reading

compliance, universal ssh key manager, ssh key management, certificate management, hkma

Catch Up with the Coming Evolution: SSH Key and Certificate Management
By Ricky Ho on June 20, 2016

In mid May, SSH Communications Security participated to the Cyber Security Summit, organized by the Hong Kong Applied Science and Technology Research Institute and the Hong Kong Police...

Continue Reading

cryptoauditor, universal ssh key manager, Smart Nation, MAS, third-party

Third-Party Access Management Fuels SSH Expansion in Southeast Asia
By Tommi Lampila on April 28, 2016

INTRODUCTION: The growing demand for our CryptoAuditor and Universal SSH Key Manager solutions prompted us to expand our footprint in Asia by opening an office in Singapore early this...

Continue Reading

cryptoauditor, key management, privileged identity management, identity and access management, encrypted channel monitoring, universal ssh key manager, encrypted channels, Privileged access management, PAM

Shared Account Password and Key Management – Is There an Easier Way?
By Jussi Valkiainen on January 4, 2016

This blog is a continuation of my earlier blog “Plug and Play or Plug and Pain” on Privileged Access Management (PAM), posted on December 16, 2015. I will dive a bit deeper now into the...

Continue Reading

cryptoauditor, universal ssh key manager, APAC, Smart Nation, Smart City

Moving in the Right Direction in Secure Smart Nation and Cities
By Tommi Lampila on November 16, 2015

In October, SSH Communications Security joined two conferences in Singapore: GovernmentWare and Cloud Expo Asia. The hot topics at both events were around Smart Nation, aligning with...

Continue Reading

key management, nist, compliance, universal ssh key manager, trusted access, Tatu Ylönen

IT'S OFFICIAL - Security for Secure Shell Is A NIST Publication (7966)!!
By Fouad Khalil on November 3, 2015

In 1995 the Secure Shell (SSH) protocol was invented and it soon became the gold standard for data-in-transit security.  Today Secure Shell is one of the most widely used protocols in the...

Continue Reading

key management, ukm product updates, universal ssh key manager

Introducing the Universal SSH Key Manager appliance
By Roman Hernandez on September 15, 2015

Enterprises often have more Secure Shell identities than employees, and just as with employees, there must be a central management entity tasked with oversight of those identities.

Continue Reading

cryptoauditor, privileged identity management, identity and access management, encrypted channel monitoring, iam, universal ssh key manager

SSH at Interop Tokyo and Strengthening Our Foothold in Japan
By Shiho Hashimoto on August 11, 2015

Together with our local partner DIT, SSH Communications Security participated in one of the biggest IT exhibitions in Japan: Interop Tokyo. With close to 140,000 visitors in 3 days, DIT...

Continue Reading

key management, universal ssh key manager

You Control The Lock. The House Key Less So.
By Matthew McKenna on June 2, 2015

We’ve all been there: standing outside your home, you put your hand in your pocket, only to discover your house key is gone. Panic sets in.  Where is it? Did I leave it at work? Did it fall...

Continue Reading

ukm product updates, universal ssh key manager

Elliptic Curves and More: Universal SSH Key Manager Version 1.3.3
By Roman Hernandez on September 7, 2014

The latest version of Universal SSH Key Manager brings an important update: support for elliptic curve cryptography (ECC) keys. If you’re not familiar with ECC, suffice it to say that it’s...

Continue Reading