SSH.COM Blog

cybersecurity PAM SSH

SSH.COM’s Customer Advisory Board 2021: Expert vie...

We had our 2021 Customer Advisory Board (CAB) event just a while ago. This year, the CAB was organized virtually and was attended by more than 30 customers from the EMEA region. The participants represented leading European organizations in financial services, manufacturing, IT services, and transportation, among others. The full-day event gave the attendees an opportunity to hear from industry ex...

PAM encrypted traffic SSH Zero Trust just-in-time

The Network Effect, Increasing Number of Critical ...

The Network Effect states the value of a telecommunications network is proportional to the square of the number of connected users of the system (N2). A decade in the naming, this law was a marketing tool to help 3Com sell more Ethernet cards (Token Ring was the IBM developed competitor at the time). It argued that the value of communications rises over time with the number of connections and henc...

Tectia SSH SSH

The mainframe isn’t going anywhere – how can we se...

Mainframes are often derided as a relic of a bygone era, but the facts say differently. In fact, IBM – the world’s largest mainframe vendor – recently released a report that showed Z series mainframe sales are up: the revenue grew 61 percent in Q1 this year. Last year IBM reported an increase of 70 percent year over year. The list just goes on: Ninety-two of the world’s top 100 banks all of the to...

Tectia SSH SSH

10 reasons to choose commercial secure file transf...

First of all, don't get all riled up because of the blog title... We actually love Open Source products like PuTTY - World's Most Popular Free SSH Client,or other free clients like WinSCP. otherwise we would not let you download them from our site.   But we think there are many situations in which a top-tier commercial product cannot be beat.

encrypted traffic SSH just-in-time

Treat SSH Keys Like Passwords and Police According...

If you think about it, passwords need to be managed just like SSH keys, and that involves three key requirements: The enforcement of complex or long passwords. Some level of enforcement around the rotation of passwords (we can argue the rotation interval can be argued another time). Controls around who has access to the password. Let’s cover each requirement in more detail. Point 1: Complex or lon...

SSH RDP just-in-time remote work

Recent WHO and ZOOM data breaches prove the urgent...

Cyberattacks attacks are on the rise once again. High-profile targets like the World Health Organization (WHO) and their top officials are a lucrative target for hackers.  Also, hackers got hold of 500,000 Zoom user passwords. “This is unprecedented for everyone here. We’re doing what we can to mitigate it” is a direct quote from WHO’s chief information officer (CIO), Bernardo Mariano. He also sta...

SSH RDP just-in-time remote work

How to set up secure remote access for employees w...

IT and system administrators are faced with a dilemma: how to ensure people working from home can access specific internal systems securely. Allowing VPN access is not an ideal solution if access is needed only to a particular Windows application or internal website. Another example of specific access: a remote worker would need to transfer files to/from a Linux/Unix/Windows system that under norm...

SSH SSH vision investors

Thank you for a great CMD!

It is hard to overemphasize the importance of a company management team meeting investors face-to-face.

open source SSH SSH hack threat Secure Shell governance vulnerability

Holy Seeping SCP!

Numerous IT media outlets, including The Register and Hacker News, reported earlier this week that serious vulnerabilities impacting several SCP (Secure Copy Protocol) clients have been discovered by a Finnish IT security researcher Harry Sintonen.

cybersecurity Privileged Identity Management identity and access management compliance Universal SSH Key Manager Snowden Privileged Access Management SSH.COM SSH Key management audit breach Equifax SSH Keys financial services Swift GDPR ISACA SSH

Financial Security Crisis Looming in 2018...The Pe...

"The wind and the waves are always on the side of the ablest navigator. -   Edmund Gibbon

Author

Want to be the first to know about new blog posts?

Fill in you email address and be the first to know about it. 

Subscribe to Email Updates

SSH.COM is one of the most trusted brands in cyber security.

We help major enterprises solve the security challenges of digital transformation. We design best-of-breed commercial solutions for secure access that help our customers win in the global data economy.

Read more about our SSH.COM

Latest posts from the SSH.COM blog