SSH.COM Blog

Blog

Subscribe to Email Updates

We promise to send you awesome stuff you'll want to read more than once.

cybersecurity cloud security cloudification

In Defense of the “Dumb User” – Are Security Solut...

Despite the best efforts of security providers and users, data breaches continue to proliferate, with 4.1 billion records exposed in data breaches in the first half of 2019 alone. And each time there’s a breach, we go through the same process of trying to figure out who’s to blame. Was it an IT admin, who configured a piece of software incorrectly? Was it a user, who clicked on a link they shouldn...

cloudification PrivX customer

Three tips for managing admin access to your cloud...

As companies’ workloads increasingly move to the cloud, new security concerns arise. Chief among these is making sure your company is prepared to manage access to the sensitive data that resides in the cloud. Traditional privileged access management solutions (PAM) are expensive, and they’re too slow for onboarding and offboarding in multi-cloud environments. Instead, companies need a lean, scalab...

Gartner PAM just-in-time

Gartner: standing privileges in IT are a risk

How many years has the cybersecurity industry talked about “the password problem”? And how many years has the conclusion always been the same: passwords are one of the weakest links in the cybersecurity chain. They are always either too simple, stolen or lost. Or they become too complex to remember. But everybody has to use them. Right? Think again. We can’t claim to be able to eliminate all the p...

cloudification PrivX customer

What software deployment and maintenance looks lik...

When we talk about simplifying access management tools, we tend to focus a lot on the end user. Developers, for example, often bypass the bulky and hard-to-use privileged access management (PAM) solutions their organization has put in place to secure access to servers and other valuable assets, mainly because they’re interested in working faster. But they’re not the only ones with a need for speed...

3rd party access cloudification PrivX customer

Free access solution for freelance developers and ...

Just over two months ago, we launched PrivX Free – a fully-featured access management gateway to multi-cloud and on-prem IT environments with a twist. The twist, of course, is that PrivX is precisely what the name promises: free. The interest in the product has been overwhelming with the number of registered users growing day by day. Below is a bit of a breakdown of who uses PrivX Free, what are t...

PAM Secure Shell governance

Malicious SSH client steals credentials masked as ...

Alert Logic researchers have discovered a malicious Secure Shell (SSH) client that uses Domain Name System (DNS) queries to transport Secure Shell login credentials which are stolen when an unsuspecting user provides them on the compromised client computer when connecting to Secure Shell servers. For more details on this malware, please visit Alert Logic’s page. 

PrivX funding news

Challenging the access market: faster, higher, bol...

The speed of go-to-market is one of the key elements in product development. When you have a special product, you want to make it available for the right audience without delays. At the same time, it's a game of balance: you also need to gather enough market, analyst and customer intelligence to make the product fulfil customer needs you didn't even realize existed. Combine your trust in your prod...

compliance Universal SSH Key Manager breach risk management PrivX

Mismanaging who has access to sensitive data is as...

We get news about successful hacks, breaches and ransomware basically every week. As a consequence, stock listed companies often see their stock prices plummet, their reputation takes a hit and their brands tarnished. In some cases, the general public might take their business elsewhere. But there’s more to the story of cyber security incidents: a failure to act and report in a timely fashion incr...

compliance Universal SSH Key Manager breach risk management PrivX

Data breaches have a long-lasting impact

Do you remember that infamous Equifax breach? The one where hackers stole the personal information of 147.7 million US citizens? We wrote a blog post about the incident a few years back. Whether or not you remember the case, the first thing you should notice that the case is still relevant – almost two years after it was discovered. One of the reasons is that US authorities have taken a stricter a...

Universal SSH Key Manager partners cloudification PrivX

CEO view on the new Tech Mahindra partnership with...

Tech Mahindra recently announced a strategic partnership with SSH.COM in order to serve enterprise customers with the SSH.COM portfolio offering. The partnership focuses on our Universal SSH Key Manager and PrivX access management solutions. SSH.COM CEO, Kaisa Olkkonen, looks at the evolution of our approach to partnerships and the exciting prospects for our relationship with Tech Mahindra.

Author

Want to be the first to know about new blog posts?

Fill in you email address and be the first to know about it. 

Subscribe to Email Updates

SSH.COM is one of the most trusted brands in cyber security.

We help major enterprises solve the security challenges of digital transformation. We design best-of-breed commercial solutions for secure access that help our customers win in the global data economy.

Read more about our SSH.COM

Latest posts from the SSH.COM blog