<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>Academy</title>
    <link>https://www.ssh.com/academy</link>
    <description>On our Academy pages, you can find a huge amount of information about SSH, PuTTY, risk and compliance for enterprise security IT professionals, academics - and for the IT community in general.</description>
    <language>en</language>
    <pubDate>Fri, 01 Mar 2024 13:36:26 GMT</pubDate>
    <dc:date>2024-03-01T13:36:26Z</dc:date>
    <dc:language>en</dc:language>
    <item>
      <title>What is the NIST 2.0 Framework? | SSH</title>
      <link>https://www.ssh.com/academy/compliance/nist2.0-framework</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/academy/compliance/nist2.0-framework" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/SSH%20Academy/NIST2.0.jpg" alt="NIST 2.0" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;a href="https://www.nist.gov/"&gt;NIST, the National Institute of Standards and Technology&lt;/a&gt; of the U.S. Department of Commerce, recently published a public draft of the new NIST Cybersecurity Framework (NIST CSF or NIST Framework) - version 2.0.&lt;/p&gt; 
&lt;p&gt;NIST helps businesses to better understand, manage, and reduce their cybersecurity risk and protect their networks and data.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;The original &lt;a href="https://www.ssh.com/academy/compliance/cybersecurity-framework"&gt;NIST Framework&lt;/a&gt; (as well as the updated NIST 2.0 Framework) is voluntary and gives businesses an outline of the best practices for cybersecurity. The NIST Framework has been used widely to reduce cybersecurity risks since its initial publication in 2014, and many organizations use the NIST CSF as an effective framework for addressing cybersecurity risks.&lt;/p&gt; 
&lt;p&gt;&lt;span style="letter-spacing: 0.02em;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/academy/compliance/nist2.0-framework" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/SSH%20Academy/NIST2.0.jpg" alt="NIST 2.0" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;a href="https://www.nist.gov/"&gt;NIST, the National Institute of Standards and Technology&lt;/a&gt; of the U.S. Department of Commerce, recently published a public draft of the new NIST Cybersecurity Framework (NIST CSF or NIST Framework) - version 2.0.&lt;/p&gt; 
&lt;p&gt;NIST helps businesses to better understand, manage, and reduce their cybersecurity risk and protect their networks and data.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;The original &lt;a href="https://www.ssh.com/academy/compliance/cybersecurity-framework"&gt;NIST Framework&lt;/a&gt; (as well as the updated NIST 2.0 Framework) is voluntary and gives businesses an outline of the best practices for cybersecurity. The NIST Framework has been used widely to reduce cybersecurity risks since its initial publication in 2014, and many organizations use the NIST CSF as an effective framework for addressing cybersecurity risks.&lt;/p&gt; 
&lt;p&gt;&lt;span style="letter-spacing: 0.02em;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Facademy%2Fcompliance%2Fnist2.0-framework&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Facademy&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Fri, 23 Feb 2024 12:58:19 GMT</pubDate>
      <guid>https://www.ssh.com/academy/compliance/nist2.0-framework</guid>
      <dc:date>2024-02-23T12:58:19Z</dc:date>
      <dc:creator>Admin</dc:creator>
    </item>
    <item>
      <title>Understanding the Digital Operational Resilience Act (DORA)? | SSH</title>
      <link>https://www.ssh.com/academy/compliance/digital-operational-resilience-act-dora</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/academy/compliance/digital-operational-resilience-act-dora" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/SSH%20Academy/DORA.jpg" alt="digital operational resilience act, DORA regulation" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;The Digital Operational Resilience Act (Regulation (EU) 2022/2554) offers a solution to a pivotal problem in the EU financial regulation.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;DORA aims to standardize regulations concerning operational resilience within the financial sector, encompassing 21 diverse financial entities. It addresses key areas such as ICT risk management, incident management and reporting, testing the operational resilience of ICT systems, and the oversight of ICT third-party risks.&lt;/p&gt; 
&lt;p&gt;&lt;span style="letter-spacing: 0.02em;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/academy/compliance/digital-operational-resilience-act-dora" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/SSH%20Academy/DORA.jpg" alt="digital operational resilience act, DORA regulation" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;The Digital Operational Resilience Act (Regulation (EU) 2022/2554) offers a solution to a pivotal problem in the EU financial regulation.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;DORA aims to standardize regulations concerning operational resilience within the financial sector, encompassing 21 diverse financial entities. It addresses key areas such as ICT risk management, incident management and reporting, testing the operational resilience of ICT systems, and the oversight of ICT third-party risks.&lt;/p&gt; 
&lt;p&gt;&lt;span style="letter-spacing: 0.02em;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Facademy%2Fcompliance%2Fdigital-operational-resilience-act-dora&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Facademy&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <pubDate>Mon, 19 Feb 2024 09:21:56 GMT</pubDate>
      <guid>https://www.ssh.com/academy/compliance/digital-operational-resilience-act-dora</guid>
      <dc:date>2024-02-19T09:21:56Z</dc:date>
      <dc:creator>Admin</dc:creator>
    </item>
    <item>
      <title>What is Privileged Identity Management (PIM)? | SSH</title>
      <link>https://www.ssh.com/academy/iam/what-is-pim</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/academy/iam/what-is-pim" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/SSH%20Academy/PIM.jpg" alt="privileged identity management (PIM)" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Privileged Identity Management (PIM) is the practice of securing and managing privileged accounts. It enables people to manage, control, and monitor access to important resources in their organizations.&lt;/p&gt; 
&lt;p&gt;Organizations want to minimize the number of people who have access to secure information or resources because that reduces the chance of a malicious actor getting access or an authorized user inadvertently impacting a sensitive resource. An organization may implement PIM via a specialized, standalone tool or a set of tools and processes.&lt;/p&gt; 
&lt;p&gt;&lt;span style="letter-spacing: 0.02em;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/academy/iam/what-is-pim" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/SSH%20Academy/PIM.jpg" alt="privileged identity management (PIM)" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Privileged Identity Management (PIM) is the practice of securing and managing privileged accounts. It enables people to manage, control, and monitor access to important resources in their organizations.&lt;/p&gt; 
&lt;p&gt;Organizations want to minimize the number of people who have access to secure information or resources because that reduces the chance of a malicious actor getting access or an authorized user inadvertently impacting a sensitive resource. An organization may implement PIM via a specialized, standalone tool or a set of tools and processes.&lt;/p&gt; 
&lt;p&gt;&lt;span style="letter-spacing: 0.02em;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Facademy%2Fiam%2Fwhat-is-pim&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Facademy&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>PrivX</category>
      <pubDate>Tue, 19 Dec 2023 12:14:05 GMT</pubDate>
      <guid>https://www.ssh.com/academy/iam/what-is-pim</guid>
      <dc:date>2023-12-19T12:14:05Z</dc:date>
      <dc:creator>Admin</dc:creator>
    </item>
    <item>
      <title>What is Identity Governance and Administration (IGA)? | SSH</title>
      <link>https://www.ssh.com/academy/iam/what-is-identity-governance-and-administration-iga</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/academy/iam/what-is-identity-governance-and-administration-iga" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/SSH%20Academy/IGA.jpg" alt="IGA, identity governance and administration" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-size: 16px;"&gt;&lt;span style="color: #000000;"&gt;Identity Governance and Administration (IGA) is also known as identity security. It is at the heart of IT security operations, enabling and securing identities for users, applications, and data. IGA provides automated access while at the same time managing potential security and compliance risks.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="letter-spacing: 0.02em;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/academy/iam/what-is-identity-governance-and-administration-iga" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/SSH%20Academy/IGA.jpg" alt="IGA, identity governance and administration" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-size: 16px;"&gt;&lt;span style="color: #000000;"&gt;Identity Governance and Administration (IGA) is also known as identity security. It is at the heart of IT security operations, enabling and securing identities for users, applications, and data. IGA provides automated access while at the same time managing potential security and compliance risks.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="letter-spacing: 0.02em;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Facademy%2Fiam%2Fwhat-is-identity-governance-and-administration-iga&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Facademy&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Zero Trust Suite</category>
      <pubDate>Tue, 19 Dec 2023 07:30:27 GMT</pubDate>
      <guid>https://www.ssh.com/academy/iam/what-is-identity-governance-and-administration-iga</guid>
      <dc:date>2023-12-19T07:30:27Z</dc:date>
      <dc:creator>Admin</dc:creator>
    </item>
    <item>
      <title>Microsoft Azure AD expands into Entra ID: All you need to know | SSH</title>
      <link>https://www.ssh.com/academy/iam/microsoft-azure-ad-expands-into-entra-id-all-you-need-to-know</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/academy/iam/microsoft-azure-ad-expands-into-entra-id-all-you-need-to-know" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/SSH%20Academy/Entra-ID.jpg" alt="Entra ID" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Microsoft recently shared some big news. They have launched a new version of Azure AD, renaming the product into Entra ID. Microsoft says they wanted to simplify their product naming and unify their product family.&amp;nbsp;&lt;/p&gt; 
&lt;p style="font-size: 16px;"&gt;&lt;span style="color: #000000;"&gt;Entra ID is a cloud-based &lt;/span&gt;&lt;a href="https://www.ssh.com/academy/iam"&gt;&lt;span&gt;identity and access management solution&lt;/span&gt;&lt;/a&gt;&lt;span style="color: #000000;"&gt; that helps organizations secure and manage identities for hybrid and multi-cloud environments&lt;/span&gt;&lt;span style="color: #000000;"&gt;. &lt;/span&gt;&lt;span style="color: #000000;"&gt;Entra is an umbrella term for all things related to identity and access in the M365 environment. Entra ID has the same managing and protecting capabilities as&lt;/span&gt;&lt;span&gt; &lt;a href="https://www.ssh.com/academy/iam/active-directory"&gt;Azure AD&lt;/a&gt;&lt;/span&gt;&lt;span style="color: #000000;"&gt;. But with two new products added to Entra ID, Microsoft is dipping its toes into the SSE world.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="letter-spacing: 0.02em;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/academy/iam/microsoft-azure-ad-expands-into-entra-id-all-you-need-to-know" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/SSH%20Academy/Entra-ID.jpg" alt="Entra ID" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;Microsoft recently shared some big news. They have launched a new version of Azure AD, renaming the product into Entra ID. Microsoft says they wanted to simplify their product naming and unify their product family.&amp;nbsp;&lt;/p&gt; 
&lt;p style="font-size: 16px;"&gt;&lt;span style="color: #000000;"&gt;Entra ID is a cloud-based &lt;/span&gt;&lt;a href="https://www.ssh.com/academy/iam"&gt;&lt;span&gt;identity and access management solution&lt;/span&gt;&lt;/a&gt;&lt;span style="color: #000000;"&gt; that helps organizations secure and manage identities for hybrid and multi-cloud environments&lt;/span&gt;&lt;span style="color: #000000;"&gt;. &lt;/span&gt;&lt;span style="color: #000000;"&gt;Entra is an umbrella term for all things related to identity and access in the M365 environment. Entra ID has the same managing and protecting capabilities as&lt;/span&gt;&lt;span&gt; &lt;a href="https://www.ssh.com/academy/iam/active-directory"&gt;Azure AD&lt;/a&gt;&lt;/span&gt;&lt;span style="color: #000000;"&gt;. But with two new products added to Entra ID, Microsoft is dipping its toes into the SSE world.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="letter-spacing: 0.02em;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Facademy%2Fiam%2Fmicrosoft-azure-ad-expands-into-entra-id-all-you-need-to-know&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Facademy&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>PrivX</category>
      <category>Microsoft Azure cloud services</category>
      <category>Zero Trust Suite</category>
      <pubDate>Wed, 13 Dec 2023 10:13:50 GMT</pubDate>
      <guid>https://www.ssh.com/academy/iam/microsoft-azure-ad-expands-into-entra-id-all-you-need-to-know</guid>
      <dc:date>2023-12-13T10:13:50Z</dc:date>
      <dc:creator>Admin</dc:creator>
    </item>
    <item>
      <title>What Is the Industrial Internet of Things (IIoT)? | SSH</title>
      <link>https://www.ssh.com/academy/what-is-the-industrial-internet-of-things</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/academy/what-is-the-industrial-internet-of-things" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/SSH%20Academy/iiot-01.jpg" alt="what is iiot, industrial internet of things, what is industrial internet of things" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div&gt; 
 &lt;p&gt;The Industrial Internet of Things (IIoT) refers to applying the &lt;a href="https://www.ssh.com/academy/iot"&gt;Internet of Things (IoT)&lt;/a&gt; in industrial sectors. IIoT enables industries to manage and control complex manufacturing environments and processes.&lt;/p&gt; 
 &lt;p&gt;IIoT consists of smart devices and sensors that monitor machinery or applications, the networks between the devices, and their connections. These devices collect data related to the machinery or production processes and deliver it to the cloud and/or servers. The smart devices can also be controlled remotely via a connection run over the internet.&lt;/p&gt; 
 &lt;p&gt;IIoT is focused on machine-to-machine (M2M) communication, machine learning, and big data, enabling industries to be more efficient and operate on a much more reliable level.&lt;/p&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span style="letter-spacing: 0.02em;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/academy/what-is-the-industrial-internet-of-things" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/SSH%20Academy/iiot-01.jpg" alt="what is iiot, industrial internet of things, what is industrial internet of things" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div&gt; 
 &lt;p&gt;The Industrial Internet of Things (IIoT) refers to applying the &lt;a href="https://www.ssh.com/academy/iot"&gt;Internet of Things (IoT)&lt;/a&gt; in industrial sectors. IIoT enables industries to manage and control complex manufacturing environments and processes.&lt;/p&gt; 
 &lt;p&gt;IIoT consists of smart devices and sensors that monitor machinery or applications, the networks between the devices, and their connections. These devices collect data related to the machinery or production processes and deliver it to the cloud and/or servers. The smart devices can also be controlled remotely via a connection run over the internet.&lt;/p&gt; 
 &lt;p&gt;IIoT is focused on machine-to-machine (M2M) communication, machine learning, and big data, enabling industries to be more efficient and operate on a much more reliable level.&lt;/p&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span style="letter-spacing: 0.02em;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Facademy%2Fwhat-is-the-industrial-internet-of-things&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Facademy&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>PrivX OT</category>
      <pubDate>Tue, 22 Aug 2023 11:01:26 GMT</pubDate>
      <guid>https://www.ssh.com/academy/what-is-the-industrial-internet-of-things</guid>
      <dc:date>2023-08-22T11:01:26Z</dc:date>
      <dc:creator>Admin</dc:creator>
    </item>
    <item>
      <title>What is a Secure Email Gateway (SEG)? | SSH</title>
      <link>https://www.ssh.com/academy/secure-information-sharing/what-is-secure-email-gateway</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/academy/secure-information-sharing/what-is-secure-email-gateway" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/SSH%20Academy/secure-email-gateways-01.jpg" alt="secure email gateways, what is secure email gateway, email security gateways" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div&gt; 
 &lt;p&gt;Secure Email Gateways (SEGs), or Email Security Gateways, are made to filter out malicious email traffic and only deliver non-threatening emails. Are they always effective and enough to protect you from cyberattacks? Not completely.&amp;nbsp;&lt;/p&gt; 
 &lt;p&gt;Read more about Secure Email Gateways, why they are not always trustworthy, and how organizations can protect themselves better from email-based cyberattacks.&lt;/p&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span style="letter-spacing: 0.02em;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/academy/secure-information-sharing/what-is-secure-email-gateway" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/SSH%20Academy/secure-email-gateways-01.jpg" alt="secure email gateways, what is secure email gateway, email security gateways" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div&gt; 
 &lt;p&gt;Secure Email Gateways (SEGs), or Email Security Gateways, are made to filter out malicious email traffic and only deliver non-threatening emails. Are they always effective and enough to protect you from cyberattacks? Not completely.&amp;nbsp;&lt;/p&gt; 
 &lt;p&gt;Read more about Secure Email Gateways, why they are not always trustworthy, and how organizations can protect themselves better from email-based cyberattacks.&lt;/p&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span style="letter-spacing: 0.02em;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Facademy%2Fsecure-information-sharing%2Fwhat-is-secure-email-gateway&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Facademy&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Deltagon Suite</category>
      <pubDate>Thu, 20 Jul 2023 08:56:24 GMT</pubDate>
      <guid>https://www.ssh.com/academy/secure-information-sharing/what-is-secure-email-gateway</guid>
      <dc:date>2023-07-20T08:56:24Z</dc:date>
      <dc:creator>Admin</dc:creator>
    </item>
    <item>
      <title>What is Email Phishing? | SSH</title>
      <link>https://www.ssh.com/academy/secure-information-sharing/what-is-email-phishing</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/academy/secure-information-sharing/what-is-email-phishing" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/SSH%20Academy/email-phishing-01.jpg" alt="what is email phishing, email phishing types" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div&gt; 
 &lt;p&gt;&lt;span&gt;The term “phishing” comes from the word fishing, because the term describes a scenario in which scammers are fishing for sensitive information by appearing as a trusted authority, like a legitimate official company or a high-status employee. Email phishing is the most common type of phishing. &lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
 &lt;p&gt;&lt;span&gt;Email phishing is a form of scamming used by online attackers who send vicious emails to intentionally deceive people into believing a fraud. These attacks aim to manipulate email receivers into handing over sensitive data such as financial information, business secrets, login information, or system credentials. The most commonly used technique is to manipulate people by creating a sense of fear and urgency to perform an action, like clicking a malicious link or downloading a file containing malware.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
 &lt;p&gt;&lt;span&gt;Additionally, email phishing is a social engineering technique. Social engineering is used by online attackers with the aim to understand user behavior, so they can create manipulative techniques and subsequently scam people. The goal of social engineering is to direct and manipulate users into acting without thinking about their actions.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span style="letter-spacing: 0.02em;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/academy/secure-information-sharing/what-is-email-phishing" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/SSH%20Academy/email-phishing-01.jpg" alt="what is email phishing, email phishing types" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div&gt; 
 &lt;p&gt;&lt;span&gt;The term “phishing” comes from the word fishing, because the term describes a scenario in which scammers are fishing for sensitive information by appearing as a trusted authority, like a legitimate official company or a high-status employee. Email phishing is the most common type of phishing. &lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
 &lt;p&gt;&lt;span&gt;Email phishing is a form of scamming used by online attackers who send vicious emails to intentionally deceive people into believing a fraud. These attacks aim to manipulate email receivers into handing over sensitive data such as financial information, business secrets, login information, or system credentials. The most commonly used technique is to manipulate people by creating a sense of fear and urgency to perform an action, like clicking a malicious link or downloading a file containing malware.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
 &lt;p&gt;&lt;span&gt;Additionally, email phishing is a social engineering technique. Social engineering is used by online attackers with the aim to understand user behavior, so they can create manipulative techniques and subsequently scam people. The goal of social engineering is to direct and manipulate users into acting without thinking about their actions.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span style="letter-spacing: 0.02em;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Facademy%2Fsecure-information-sharing%2Fwhat-is-email-phishing&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Facademy&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Deltagon Suite</category>
      <pubDate>Thu, 11 May 2023 13:13:48 GMT</pubDate>
      <guid>https://www.ssh.com/academy/secure-information-sharing/what-is-email-phishing</guid>
      <dc:date>2023-05-11T13:13:48Z</dc:date>
      <dc:creator>Admin</dc:creator>
    </item>
    <item>
      <title>What is Break-Glass Access? | SSH</title>
      <link>https://www.ssh.com/academy/secrets-management/what-is-break-glass-access</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/academy/secrets-management/what-is-break-glass-access" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/SSH%20Academy/break-glass-access-01.jpg" alt="what is break-glass access" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div&gt; 
 &lt;div&gt; 
  &lt;div&gt; 
   &lt;div&gt; 
    &lt;p&gt;&lt;span&gt;When deploying an access management solution, like a &lt;a href="https://www.ssh.com/academy/pam/what-is-privileged-access-management"&gt;privileged access management (PAM)&lt;/a&gt; tool, businesses often require a “back-up” access capability that would allow a user or users to access their system even in case of an emergency, when the deployed PAM tool is unavailable to provide access in a regular way. This type of emergency access is called break-glass access.&lt;/span&gt;&lt;/p&gt; 
   &lt;/div&gt; 
  &lt;/div&gt; 
 &lt;/div&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span style="letter-spacing: 0.02em;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/academy/secrets-management/what-is-break-glass-access" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/SSH%20Academy/break-glass-access-01.jpg" alt="what is break-glass access" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;div&gt; 
 &lt;div&gt; 
  &lt;div&gt; 
   &lt;div&gt; 
    &lt;p&gt;&lt;span&gt;When deploying an access management solution, like a &lt;a href="https://www.ssh.com/academy/pam/what-is-privileged-access-management"&gt;privileged access management (PAM)&lt;/a&gt; tool, businesses often require a “back-up” access capability that would allow a user or users to access their system even in case of an emergency, when the deployed PAM tool is unavailable to provide access in a regular way. This type of emergency access is called break-glass access.&lt;/span&gt;&lt;/p&gt; 
   &lt;/div&gt; 
  &lt;/div&gt; 
 &lt;/div&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span style="letter-spacing: 0.02em;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Facademy%2Fsecrets-management%2Fwhat-is-break-glass-access&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Facademy&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>secrets management</category>
      <category>Zero Trust Suite</category>
      <pubDate>Thu, 06 Apr 2023 10:47:18 GMT</pubDate>
      <guid>https://www.ssh.com/academy/secrets-management/what-is-break-glass-access</guid>
      <dc:date>2023-04-06T10:47:18Z</dc:date>
      <dc:creator>Admin</dc:creator>
    </item>
    <item>
      <title>Protect yourself against Business Email Compromise attacks | SSH</title>
      <link>https://www.ssh.com/academy/secure-information-sharing/how-to-prevent-business-email-compromise-bec</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/academy/secure-information-sharing/how-to-prevent-business-email-compromise-bec" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/SSH%20Academy/protection-against-business-email-compromise-01.jpg" alt="business email compromise" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;&lt;a href="https://www.ssh.com/academy/secure-information-sharing/what-is-business-email-compromise-bec"&gt;Business Email Compromise&lt;/a&gt; (BEC) has become one of the fastest-growing cybercrime threats in recent years, with businesses of all sizes and industries being targeted. Cybercriminals are also becoming more sophisticated in their tactics and techniques,&lt;strong&gt; &lt;/strong&gt;increasing the threat of BEC. &lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/academy/secure-information-sharing/how-to-prevent-business-email-compromise-bec" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/SSH%20Academy/protection-against-business-email-compromise-01.jpg" alt="business email compromise" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;&lt;a href="https://www.ssh.com/academy/secure-information-sharing/what-is-business-email-compromise-bec"&gt;Business Email Compromise&lt;/a&gt; (BEC) has become one of the fastest-growing cybercrime threats in recent years, with businesses of all sizes and industries being targeted. Cybercriminals are also becoming more sophisticated in their tactics and techniques,&lt;strong&gt; &lt;/strong&gt;increasing the threat of BEC. &lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Facademy%2Fsecure-information-sharing%2Fhow-to-prevent-business-email-compromise-bec&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Facademy&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Secure Information Sharing</category>
      <category>Deltagon Suite</category>
      <pubDate>Wed, 29 Mar 2023 07:58:29 GMT</pubDate>
      <guid>https://www.ssh.com/academy/secure-information-sharing/how-to-prevent-business-email-compromise-bec</guid>
      <dc:date>2023-03-29T07:58:29Z</dc:date>
      <dc:creator>Admin</dc:creator>
    </item>
  </channel>
</rss>
