cybersecurity PAM msp

MSPs and PAM for access: why it’s a WIN, WIN, WIN

Managed Service Providers (MSP) are an important part of the growing IT ecosystem as more and more enterprises outsource parts or most of their infrastructure to MSPs.

cybersecurity PAM SSH

SSH.COM’s Customer Advisory Board 2021: Expert vie...

We had our 2021 Customer Advisory Board (CAB) event just a while ago. This year, the CAB was organized virtually and was attended by more than 30 customers from the EMEA region. The participants represented leading European organizations in financial services, manufacturing, IT services, and transportation, among others. The full-day event gave the attendees an opportunity to hear from industry ex...

cybersecurity cloud security Zero Trust

5 must-haves for future-proof, multi-cloud privile...

Editor's note: this blog was posted originally on December 19, 2019 and has been updated with more links and other tweaks. Cloud environments today require modern tools for cloud access management. Traditional PAMs, while useful for enterprises’ on-prem environments, have some limitations where cloud is involved however. Fast-moving cloud teams require elasticity and scalability that modern access...

cybersecurity cloud security Zero Trust

Where are you now on your zero trust journey?

Every company has different cybersecurity priorities, but top-level trends tend to bubble up to the top among all organizations. The stage these organizations are at in those trends is what varies from company to company. Some organizations are at the cutting edge of their cybersecurity with the need to protect not just massive amounts of money for financial industries, but also personally identif...

cybersecurity cloud security cloudification

In Defense of the “Dumb User” – Are Security Solut...

Despite the best efforts of security providers and users, data breaches continue to proliferate, with 4.1 billion records exposed in data breaches in the first half of 2019 alone. And each time there’s a breach, we go through the same process of trying to figure out who’s to blame. Was it an IT admin, who configured a piece of software incorrectly? Was it a user, who clicked on a link they shouldn...

cybersecurity SSH tunneling SSH hack

Cryptomining with the SSH protocol: what big enter...

What is this about - the tech bit Cryptomining malware is primarily thought of as targeting desktops and laptops and is used to hijack system resources to mine cryptocurrency. Researchers at Dr.Web found a malicious cryptominer called Monero that is specifically designed for Linux machines.This shell script opens a backdoor for the attacker to execute commands. It is also designed to gain root she...

CryptoAuditor cybersecurity encryption SSH Keys SSH tunneling Apple

Apple hacker avoids jail in SSH tunneling attack

Bloomberg reports that the infamous teenage Apple hacker from down under has been sentenced to eight months probation. The boy was 16 at the time and is now an adult. He accessed Apple’s internal systems between 2015-2017 and copied data and authentication keys, a magistrate told a Children’s Court. He pled guilty to two charges.

cybersecurity breach SSH Keys SSH hack

Hackers are now scanning for SSH keys to exploit

Servers are under constant siege by hackers and botnets. How are attackers getting into these servers? Servers are typically broken with brute-force password attacks because this is easy when people use passwords like "1234" and "changeMe". The Secure Shell protocol and SSH Keys are ubiquitous in data centers and servers in every corner of the world. What do attackers do when faced with SSH Keys i...

cybersecurity Privileged Identity Management identity and access management compliance Universal SSH Key Manager Snowden Privileged Access Management SSH.COM SSH Key management audit breach Equifax SSH Keys financial services Swift GDPR ISACA SSH

Financial Security Crisis Looming in 2018...The Pe...

"The wind and the waves are always on the side of the ablest navigator. -   Edmund Gibbon

cybersecurity Privileged Identity Management compliance trusted access Privileged Access Management PAM SSH.COM SSH Keys risk management passwords credentialess

How To Fix Your Access Issues With One Button



Want to be the first to know about new blog posts?

Fill in you email address and be the first to know about it. 

Subscribe to Email Updates

SSH.COM is one of the most trusted brands in cyber security.

We help major enterprises solve the security challenges of digital transformation. We design best-of-breed commercial solutions for secure access that help our customers win in the global data economy.

Read more about our SSH.COM

Latest posts from the SSH.COM blog