Cryptoauditor Articles

Showing Articles: 13 of 3

May 28 2014

Identity & Access Management: Don’t get Death Starred!

Many things seem impenetrable until a “small vulnerability” is exploited. The phrase “small vulnerability” almost sounds like an oxymoron when you think about it.  Take the fable of one Luke Skywalker and the Death Star.  In the story Luke exploited a small two-meter-wide thermal exhaust port in the Death Star’s design to destroy the ultimate weapon and break the back of the Galactic Empire in their moment of triumph. To make matters worse the Empire was warned about this “small vulnerability”, but the Galactic bureaucrats reasoned that the risk was small and the whistleblowers were overestimating rebels’ chances…

Keep Reading

May 8 2014

Invisible at Infosecurity Europe 2014? Definitely Not

The major tube strike that was conducted in London during the first two days of Infosecurity Europe 2014 didn’t seem to have had an impact on the visitors count. Held from April 30 to May 1 at Earl’s Court, Infosecurity Europe is the biggest IT Security related exhibition in Europe, and supposedly brought close to 15,000 visitors there this year. And of course, we participated with a stand and speaking sessions, not to miss out on the opportunity to meet up with customers and…

Keep Reading

Apr 4 2014

Five Reasons Why You Should Monitor & Control [All of] Your Secure Shell Traffic

How many times have we heard “the perimeter isn’t secure”? In fact, with BYOD, cloud and the extended enterprise, it’s hard to define what the perimeter is anymore.  The concept of a porous perimeter that can’t be trusted is the foundation of the Zero Trust model of security and many organizations are adopting this approach. Here are five reasons why monitoring and controlling Secure Shell should be included in your organization's Zero Trust…

Keep Reading