SSH.COM Blog

Blog

Subscribe to Email Updates

We promise to send you awesome stuff you'll want to read more than once.

PCI DSS compliance Secure Shell governance PAM bypass

Top 3 PCI DSS compliance issues from weak Secure S...

The Payment Card Industry Data Security Standard (PCI DSS) is familiar to everyone in positions of responsibility in major finance companies, telcos, big box and online retailers and a host of other large organizations. Ensuring PCI DSS compliance is mandatory and fundamental in any organization that accepts, transmits or stores any cardholder data, regardless of the size or number of transactions...

compliance Privileged Access Management healthcare GDPR

Health careless - hospital in Portugal fined for n...

How would you feel if just about anybody could browse through your medical records if they felt like it? The chances are you’d be pretty upset. It wasn’t quite as this bad in Centro Hospitalar Barreiro Montijo, a hospital in Portugal, but it was close. Portugal’s supervisory authority, Comissão Nacional de Protecção de Dados, determined that the hospital violated three GDPR regulations. Let’s diss...

identity and access management partners Privileged Access Management ubisecure

Ubisecure and SSH.COM partner to bring a winning c...

SSH.COM and Ubisecure recently announced a partnership that extends the award-winning Ubisecure Identity Platform to privileged users via tight integration with SSH.COM’s PrivX lean privileged access management software.

identity and access management Privileged Access Management risk management Secure Shell governance

Is the board on board with who has access to missi...

As a board member, you’d be shocked to discover that one of your ex-employees still has access to the company email if she had left the company already a few months ago. You’d be even more shaken if you heard that the individual could also still access the company intranet.

multi-cloud PrivX

PrivX 5: lean PAM with a bigger ecosystem

SSH.COM is proud to announce the release of version 5 of PrivX. With this release, we decided to mostly focus on expanding and tweaking existing features of the product to give our customers even more bang for the buck.

Universal SSH Key Manager partners SSH Key management ISACA

Wipro to deliver SSH.COM's industry-leading Univer...

SSH.COM and Wipro Limited have partnered to promote and implement SSH.COM’s industry-leading SSH Key management solution, Universal SSH Key Manager (UKM) for large enterprises and financial firms. Wipro has become a certified SSH.COM delivery partner and has deep capabilities to implement and manage UKM for large scale customers worldwide.

Universal SSH Key Manager partners SSH Key management audit

Thales HSMs to secure SSH.COM’s industry-leading U...

SSH.COM and Thales eSecurity today announced a partnership to enable the use of Thales hardware security modules (HSMs) to secure SSH.COM’s industry-leading Universal SSH Key Manager® (UKM) solution. UKM users can now use Thales HSMs to further secure the powerful SSH master keys used by UKM, creating an additional layer of security and further reducing their attack surface.

identity and access management partners Privileged Access Management ForgeRock

SSH.COM and ForgeRock partner for identity-driven ...

"We are excited to work with ForgeRock to bring PrivX to an ever-widening audience." SSH.COM and ForgeRock® today announced a partnership designed to help organizations around the world to provide unified identity-driven, automated, role-based access controls for administrators, developers, DevOps teams, and third-party personnel.

Gartner identity and access management Privileged Access Management Fujitsu

We broke the IT security perimeter

Everyone understands the concept of a security perimeter. You only gain access if you are identified and authorized to do so. A classic example is a highly-guarded military facility. In IT security, experts have spent decades building a security perimeter for a world where servers were mostly physical and the environment mostly static. Now the mandate from the bean counters is to open the perimete...

cybersecurity SSH tunneling SSH hack

Cryptomining with the SSH protocol: what big enter...

What is this about - the tech bit Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency. Researchers at Dr.Web found a malicious cryptominer called Monero that is specifically designed for Linux machines.This shell script opens a backdoor for the attacker to execute commands. It is also designed to gain root she...

Author

Want to be the first to know about new blog posts?

Fill in you email address and be the first to know about it. 

Subscribe to Email Updates

SSH.COM is one of the most trusted brands in cyber security.

We help major enterprises solve the security challenges of digital transformation. We design best-of-breed commercial solutions for secure access that help our customers win in the global data economy.

Read more about our SSH.COM

Latest posts from the SSH.COM blog