Press Articles

Showing Articles: 14 of 4

Jun 2 2015

Day 1 of Infosecurity Europe conference is underway

Wow what a day it has been for our crew at Infosecurity Europe 2015! Our booth was ready to welcome visitors first thing in the morning, and throughout the day there was a steady stream of people wanting to learn more about Privileged Access Management approach from the creators of SSH protocol.

SSH Booth

Key demos we have on tap are SSH Universal Key manager and CryptoAuditor. Here’s James demoing how CryptoAuditor can help businesses get the transparency they need for building their businesses further, without harming productivity in the…

Keep Reading

Mar 11 2015

North South East West People & Machines - Privileged Access Management for the Cloud Does Not Have to Be Painful

When considering privileged access management challenges organizations face today, you can simply spin around in circles considering all the angles that need to be considered from a privileged user and M2M perspective. There is no doubt, a great infrastructural transformation is ongoing seeing more and more critical business application functions being moved to private, public and hybrid clouds. With this in mind, the consideration of how we monitor, control and audit our encrypted traffic and privileged access to and from the cloud, and between and within clouds is becoming a security necessity forcing us to rethink how we approach this…

Keep Reading

Aug 20 2014

Heads Up for Federal CISOs and CIOs: NIST Publishes Guidelines for SSH Key Management

For those of us who follow the activities of NIST, yesterday marked the arrival of a remarkable document with a characteristically bland NIST-style title:  “Security of Automated Access Management Using Secure Shell”. The release of this report (NIST Interagency Report 7966) has great significance for organizations that use Secure Shell – which is just about every medium to large enterprise, most government agencies and many large non-profits. So what is…

Keep Reading

Apr 30 2014

Free Can Make You Bleed

By now anyone concernedwith internet security has heard about the Heartbleed security vulnerability in OpenSSL.  What you may not be aware of is how much money and personal information is riding on this “free” security program and others like it (OpenSSH).  Free is not usually a bad thing, but it can be when it causes the software your business depends on to be under resourced…

Keep Reading