Are Data Centers Secure? A Primer on Secure Shell Key Mismanagement and Risks
Since its invention, the secure shell (SSH) data-in-transit protocol has been used by public and private organizations alike to provide remote access to administrators working offsite and to encrypt...
View ArticleMismanaging Secure Shell Keys: A Potential Data Disaster
Today, organizations of all types and sizes use the secure shell protocol—or, as it’s more commonly known, SSH—to secure data in transit. Yet many people may not know the origination of the secure...
View ArticleEncryption: The Key to Proactive Security
Identity fraud cost American consumers $18 billion last year, with a new victim hit every two seconds, according to Javelin Strategy & Research. The prevalence of identity theft is a sobering...
View ArticleOpen-Source Software and Secure Shell Keys: Lessons From the Heartbleed...
Back in the early days of the Internet, it became clear that criminal minds were eagerly turning their attention to exploiting the opportunities available to them in cyberspace. At that point, it...
View ArticleWhen Networks Have No Perimeter, Protecting Access Is Critical
This cautionary tale, sadly, has already taken place in enterprises around the world. Details have been altered to protect the clueless, but it may be only a matter of time before your organization’s...
View ArticleThe Hidden Risks of SSH
About 20 years ago, a Finnish man named Tatu Ylonen saw a need for stronger security in the nascent online world and created a powerful access protocol called Secure Shell (SSH). It provides trusted...
View ArticleEnabling DevOps With a Better Security Strategy
Survey data from Qualia suggests that as DevOps becomes mainstream, both organizational resources and budget allocation tied to measurable business outcomes will be attached to this method of rapid...
View Article
More Pages to Explore .....