Profile

Cover photo
SSH Communications Security
61 followers|14,664 views
AboutPostsPhotosVideos

Stream

 
A mishap in key management makes headlines (again). http://ssh.fi/1QVFbzz

Preparation and prudent key management practices could have made the difference here. For more, see: http://ssh.fi/1QVF9I4
1
Add a comment...
 
NSA confirms system admin accounts as a preferred attack vector into corporate systems, highlighting the importance of proper privileged access management. Universal SSH Key Manager to the rescue! #privilegedaccess #keymanagement #infosec

http://ssh.fi/1mawPJk
1
Add a comment...
 
Can SSH Private Keys Ever Truly be Secured?

Catch the second installment of our SSH MythCracker Webcast Series "The Myth of SSH Private Key" on Jan 28th 1pm EST http://ssh.fi/1l1bZLT
What are the shortfalls in traditional Privileged Access Management? What are the best practices around SSH key management?
1
Add a comment...
 
Shared Account Password and Key Management – Is There an Easier Way? http://ssh.fi/1MOT6Cc
Shared Account Password and Key Management – Is There an Easier Way?
1
Add a comment...
 
Download new "Secure Shell Guide for PCI DSS Compliance Version 3.1" http://ssh.fi/1XmuqHq
1
Add a comment...
 


NIST and the IETF are working to make SSH even more secure. Meanwhile, there's a Microsoft version lurking.
1
Add a comment...
Have them in circles
61 people
Juan Pablo Perata's profile photo
jogja alus's profile photo
Chiranth Siddappa's profile photo
Cloud Lease's profile photo
Digdaya Iyu Malig's profile photo
Greshan Bovithanthrige's profile photo
‫علي التميمي‬‎'s profile photo
Jukka Paulin's profile photo
Vanessa Burnette (AustinRecruiter)'s profile photo
 
Well-earned attention to SSH public key authentication by SC Magazine.
http://ssh.fi/1X55NR7

Combining with Universal SSH Key Manager paves a way towards compliance with SOX, FISMA, PCI, and HIPAA.
For more see: http://ssh.fi/1X55OEN
1
Add a comment...
 
4 Key Data Access Trends for 2016 http://ssh.fi/1l9R2i1 
1
Add a comment...
 
Plug and Play or Plug and Pain? How to Manage Privileged Access Effectively without Pain? http://ssh.fi/1MgGPX3
CryptoAuditor is more than a passive monitor; it provides identity-based policy controls that specify where the privileged users can go in your network and which accounts they can access. CryptoAuditor integrates with your Identity Management (IdM) systems, for example Microsoft Active Directory (AD), and stores the target host passwords and keys in a secure vault, inaccessible to the privileged users. It also integrates with Data Leakage Prevent...
1
Add a comment...
 
New from SSH: "HIPAA/HITECH! Another Tidal Wave – Does Anyone Remember SOX-404?" http://ssh.fi/1lK3Dt7
Looking forward to 2016 – The OCR will be busy as it will be selecting approximately 350 covered entities, including 232 health care providers, 109 health plans and 9 health care clearinghouses, for Phase 2 Audits.
1
Add a comment...
 
Download new "Secure Shell Guide for PCI DSS Compliance Version 3.1" http://ssh.fi/1IbN8L9
1
Add a comment...
People
Have them in circles
61 people
Juan Pablo Perata's profile photo
jogja alus's profile photo
Chiranth Siddappa's profile photo
Cloud Lease's profile photo
Digdaya Iyu Malig's profile photo
Greshan Bovithanthrige's profile photo
‫علي التميمي‬‎'s profile photo
Jukka Paulin's profile photo
Vanessa Burnette (AustinRecruiter)'s profile photo
Contact Information
Contact info
Email
Story
Tagline
The inventors of the SSH protocol
Introduction
#TRUSTEDACCESS