<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" version="2.0">
  <channel>
    <title>SSH Communications Security | Blog</title>
    <link>https://www.ssh.com/blog</link>
    <description>Stories about secure communications between people, applications, systems, and networks from industry experts with expertise in access management, risk management, and defensive cybersecurity.</description>
    <language>en-us</language>
    <pubDate>Tue, 09 Apr 2024 10:11:07 GMT</pubDate>
    <dc:date>2024-04-09T10:11:07Z</dc:date>
    <dc:language>en-us</dc:language>
    <item>
      <title>6 Features to Look Out for When Choosing a Business Communication Tool</title>
      <link>https://www.ssh.com/blog/features-to-look-out-for-when-choosing-a-business-communication-tool</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/features-to-look-out-for-when-choosing-a-business-communication-tool" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/6_features_of_business_comm_tools.jpg" alt="a business communication tool" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span style="font-weight: bold;"&gt;Communications between employees, with prospects and customers, or among business partners – they all happen mostly via email, video calls, and instant messaging these days. As a result, almost no business can operate without using some kind of business communication tool or, more likely, a set of tools.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Cybercriminals are well aware of that. With cybercrime globally on the rise, data breaches are among the top cyber threats. Targeting communication tools used by businesses is no exception. For example, commonly used solutions by&lt;/span&gt;&lt;a href="https://www.techradar.com/news/microsoft-teams-security-flaw-lets-hackers-steal-accounts-and-theres-no-fix-in-sight"&gt;&lt;strong&gt;&lt;span&gt;Microsoft&lt;/span&gt;&lt;/strong&gt;&lt;/a&gt;&lt;span&gt; and &lt;/span&gt;&lt;a href="https://cybernews.com/security/slack-admits-security-breach/"&gt;&lt;strong&gt;&lt;span&gt;Slack&lt;/span&gt;&lt;/strong&gt;&lt;/a&gt;&lt;span&gt; have in recent years experienced an increased number of cyberattacks.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Let’s review the key features that you should look out for when choosing a business communication solution to keep your organization safe.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="font-weight: bold;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/features-to-look-out-for-when-choosing-a-business-communication-tool" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/6_features_of_business_comm_tools.jpg" alt="a business communication tool" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span style="font-weight: bold;"&gt;Communications between employees, with prospects and customers, or among business partners – they all happen mostly via email, video calls, and instant messaging these days. As a result, almost no business can operate without using some kind of business communication tool or, more likely, a set of tools.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Cybercriminals are well aware of that. With cybercrime globally on the rise, data breaches are among the top cyber threats. Targeting communication tools used by businesses is no exception. For example, commonly used solutions by&lt;/span&gt;&lt;a href="https://www.techradar.com/news/microsoft-teams-security-flaw-lets-hackers-steal-accounts-and-theres-no-fix-in-sight"&gt;&lt;strong&gt;&lt;span&gt;Microsoft&lt;/span&gt;&lt;/strong&gt;&lt;/a&gt;&lt;span&gt; and &lt;/span&gt;&lt;a href="https://cybernews.com/security/slack-admits-security-breach/"&gt;&lt;strong&gt;&lt;span&gt;Slack&lt;/span&gt;&lt;/strong&gt;&lt;/a&gt;&lt;span&gt; have in recent years experienced an increased number of cyberattacks.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Let’s review the key features that you should look out for when choosing a business communication solution to keep your organization safe.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="font-weight: bold;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Ffeatures-to-look-out-for-when-choosing-a-business-communication-tool&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>secure communications</category>
      <category>Secure Collaboration</category>
      <pubDate>Tue, 09 Apr 2024 10:11:06 GMT</pubDate>
      <author>pelin.tufekci@ssh.com (Pelin Tüfekçi)</author>
      <guid>https://www.ssh.com/blog/features-to-look-out-for-when-choosing-a-business-communication-tool</guid>
      <dc:date>2024-04-09T10:11:06Z</dc:date>
    </item>
    <item>
      <title>2024, the year of cybersecurity regulations | SSH</title>
      <link>https://www.ssh.com/blog/2024-the-year-of-cybersecurity-regulations</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/2024-the-year-of-cybersecurity-regulations" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/CS_regulations_2024.jpg" alt="cybersecurity regulations 2024" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;The year 2024 will see several cybersecurity regulations and laws coming into effect – some of them are completely new (e.g. DORA), and some of them are new versions of&amp;nbsp;older regulations (e.g. NIS2 or NIST 2.0). All of them placing new demands on private as well as public organizations, which will seriously affect the cybersecurity landscape.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Let’s look at the impact of new and updated cybersecurity regulations in 2024.&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;span&gt;&lt;/span&gt;&lt;/h2&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/2024-the-year-of-cybersecurity-regulations" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/CS_regulations_2024.jpg" alt="cybersecurity regulations 2024" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;The year 2024 will see several cybersecurity regulations and laws coming into effect – some of them are completely new (e.g. DORA), and some of them are new versions of&amp;nbsp;older regulations (e.g. NIS2 or NIST 2.0). All of them placing new demands on private as well as public organizations, which will seriously affect the cybersecurity landscape.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Let’s look at the impact of new and updated cybersecurity regulations in 2024.&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;span&gt;&lt;/span&gt;&lt;/h2&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2F2024-the-year-of-cybersecurity-regulations&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>cybersecurity</category>
      <category>Zero Trust</category>
      <pubDate>Thu, 07 Mar 2024 10:54:35 GMT</pubDate>
      <author>zuzana.hutchinson@ssh.com (Zuzana Hutchinson)</author>
      <guid>https://www.ssh.com/blog/2024-the-year-of-cybersecurity-regulations</guid>
      <dc:date>2024-03-07T10:54:35Z</dc:date>
    </item>
    <item>
      <title>SSH's Journey in the CHARM Project: Enhancing OT Cybersecurity | SSH</title>
      <link>https://www.ssh.com/blog/ssh-journey-in-the-charm-project</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/ssh-journey-in-the-charm-project" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/ssh-journey-in-the-charm-project.jpg" alt="the CHARM project " class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;&lt;span style="font-weight: bold;"&gt;During the &lt;/span&gt;&lt;a href="https://info.ssh.com/ssh-for-charm-ecsel-project" style="font-weight: bold;"&gt;CHARM project&lt;/a&gt;&lt;span style="font-weight: bold;"&gt;, we have developed technology to ensure secure access management, whether it's on-site or remote, for customers operating in the OT environment. &lt;/span&gt;Our collaboration with other partners in the CHARM consortium has been crucial, offering valuable insights and helping us better understand market needs.&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/ssh-journey-in-the-charm-project" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/ssh-journey-in-the-charm-project.jpg" alt="the CHARM project " class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;&lt;span style="font-weight: bold;"&gt;During the &lt;/span&gt;&lt;a href="https://info.ssh.com/ssh-for-charm-ecsel-project" style="font-weight: bold;"&gt;CHARM project&lt;/a&gt;&lt;span style="font-weight: bold;"&gt;, we have developed technology to ensure secure access management, whether it's on-site or remote, for customers operating in the OT environment. &lt;/span&gt;Our collaboration with other partners in the CHARM consortium has been crucial, offering valuable insights and helping us better understand market needs.&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Fssh-journey-in-the-charm-project&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Operational Technology</category>
      <category>OT security</category>
      <pubDate>Tue, 05 Mar 2024 07:55:22 GMT</pubDate>
      <author>ilpo.ruohonen@ssh.com (Ilpo Ruohonen)</author>
      <guid>https://www.ssh.com/blog/ssh-journey-in-the-charm-project</guid>
      <dc:date>2024-03-05T07:55:22Z</dc:date>
    </item>
    <item>
      <title>Miikka Sainio appointed to SSH's Executive Management Team | SSH</title>
      <link>https://www.ssh.com/blog/miikka-sainio-appointed-to-ssh-communications-security-executive-management-team</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/miikka-sainio-appointed-to-ssh-communications-security-executive-management-team" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/ceo_announcement_miikka.jpg" alt="Miikka Sainio appointed to SSH's Executive Management Team" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-size: 18px;"&gt;&lt;span&gt;&lt;span style="font-weight: bold;"&gt;&lt;span&gt;SSH Communications Security Announcements by CEO&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;  
&lt;p style="font-weight: bold;"&gt;Miikka Sainio has been appointed to the SSH Communications Security (“SSH”) Executive Management Team (LT).&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/miikka-sainio-appointed-to-ssh-communications-security-executive-management-team" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/ceo_announcement_miikka.jpg" alt="Miikka Sainio appointed to SSH's Executive Management Team" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-size: 18px;"&gt;&lt;span&gt;&lt;span style="font-weight: bold;"&gt;&lt;span&gt;SSH Communications Security Announcements by CEO&lt;/span&gt;&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;  
&lt;p style="font-weight: bold;"&gt;Miikka Sainio has been appointed to the SSH Communications Security (“SSH”) Executive Management Team (LT).&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Fmiikka-sainio-appointed-to-ssh-communications-security-executive-management-team&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>SSH Communications Security</category>
      <category>Announcements by CEO</category>
      <pubDate>Mon, 04 Mar 2024 11:27:24 GMT</pubDate>
      <guid>https://www.ssh.com/blog/miikka-sainio-appointed-to-ssh-communications-security-executive-management-team</guid>
      <dc:date>2024-03-04T11:27:24Z</dc:date>
      <dc:creator>Rami Raulas</dc:creator>
    </item>
    <item>
      <title>SSH Customer Satisfaction 2024: Strong NPS &amp; Competitiveness | SSH</title>
      <link>https://www.ssh.com/blog/customer-satisfaction-soars-strong-nps-improved-competitiveness-faster-problem-solving</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/customer-satisfaction-soars-strong-nps-improved-competitiveness-faster-problem-solving" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/customer_survey.jpg" alt="ssh customer satisfaction, privx customer satisfaction" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;A recent customer satisfaction survey reveals exciting news. Our hard work is paying off!&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;We're proud to share the results.&lt;/p&gt; 
&lt;h2&gt;&lt;span&gt;&lt;/span&gt;&lt;/h2&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/customer-satisfaction-soars-strong-nps-improved-competitiveness-faster-problem-solving" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/customer_survey.jpg" alt="ssh customer satisfaction, privx customer satisfaction" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;A recent customer satisfaction survey reveals exciting news. Our hard work is paying off!&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;We're proud to share the results.&lt;/p&gt; 
&lt;h2&gt;&lt;span&gt;&lt;/span&gt;&lt;/h2&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Fcustomer-satisfaction-soars-strong-nps-improved-competitiveness-faster-problem-solving&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>customer</category>
      <category>SSH Communications Security</category>
      <pubDate>Tue, 27 Feb 2024 10:18:42 GMT</pubDate>
      <guid>https://www.ssh.com/blog/customer-satisfaction-soars-strong-nps-improved-competitiveness-faster-problem-solving</guid>
      <dc:date>2024-02-27T10:18:42Z</dc:date>
      <dc:creator>Esa Tornikoski</dc:creator>
    </item>
    <item>
      <title>SSH Communications Security joins the AIQUSEC consortium | SSH</title>
      <link>https://www.ssh.com/blog/ssh-joins-the-aiqusec-consortium-to-advance-quantum-safe-access-management-for-critical-infrastructure</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/ssh-joins-the-aiqusec-consortium-to-advance-quantum-safe-access-management-for-critical-infrastructure" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/SSH-AIQUSEC-consortium.jpg" alt="AIQUSEC" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;The AI-Based Quantum-Secure Cybersecurity Automation and Orchestration in the Edge Intelligence of Future Networks (AIQUSEC) project is set to revolutionize cybersecurity. Focused on measurable advances, especially in access, edge services, and operational technology (OT), the project aims to reshape the digital security landscape.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/ssh-joins-the-aiqusec-consortium-to-advance-quantum-safe-access-management-for-critical-infrastructure" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/SSH-AIQUSEC-consortium.jpg" alt="AIQUSEC" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;The AI-Based Quantum-Secure Cybersecurity Automation and Orchestration in the Edge Intelligence of Future Networks (AIQUSEC) project is set to revolutionize cybersecurity. Focused on measurable advances, especially in access, edge services, and operational technology (OT), the project aims to reshape the digital security landscape.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Fssh-joins-the-aiqusec-consortium-to-advance-quantum-safe-access-management-for-critical-infrastructure&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>quantum-safe</category>
      <category>Post-Quantum Cryptography</category>
      <pubDate>Fri, 23 Feb 2024 08:00:00 GMT</pubDate>
      <author>ilpo.ruohonen@ssh.com (Ilpo Ruohonen)</author>
      <guid>https://www.ssh.com/blog/ssh-joins-the-aiqusec-consortium-to-advance-quantum-safe-access-management-for-critical-infrastructure</guid>
      <dc:date>2024-02-23T08:00:00Z</dc:date>
    </item>
    <item>
      <title>How to Bridge Your PAM and Identity Management (IdM) | SSH</title>
      <link>https://www.ssh.com/blog/how-to-bridge-your-privileged-access-management-and-identity-management</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/how-to-bridge-your-privileged-access-management-and-identity-management" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/PAM_and_IdM.jpg" alt="privileged access management and identity management" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;strong&gt;&lt;span&gt;Your Privileged Access Management (PAM) and Identity Management (IdM) should work hand in hand to secure your users’ access and identities – regular users and privileged users alike.&lt;/span&gt;&lt;/strong&gt;&lt;span&gt;But traditional solutions struggle to achieve that.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Let’s look at what organizations need to understand about PAM and IdM and how you can bridge and future-proof your PAM and IdM.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="font-weight: bold;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/how-to-bridge-your-privileged-access-management-and-identity-management" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/PAM_and_IdM.jpg" alt="privileged access management and identity management" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;strong&gt;&lt;span&gt;Your Privileged Access Management (PAM) and Identity Management (IdM) should work hand in hand to secure your users’ access and identities – regular users and privileged users alike.&lt;/span&gt;&lt;/strong&gt;&lt;span&gt;But traditional solutions struggle to achieve that.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Let’s look at what organizations need to understand about PAM and IdM and how you can bridge and future-proof your PAM and IdM.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span style="font-weight: bold;"&gt;&amp;nbsp;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Fhow-to-bridge-your-privileged-access-management-and-identity-management&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>PAM</category>
      <category>Zero Trust</category>
      <category>Zero Trust Suite</category>
      <pubDate>Tue, 20 Feb 2024 09:00:00 GMT</pubDate>
      <author>zuzana.hutchinson@ssh.com (Zuzana Hutchinson)</author>
      <guid>https://www.ssh.com/blog/how-to-bridge-your-privileged-access-management-and-identity-management</guid>
      <dc:date>2024-02-20T09:00:00Z</dc:date>
    </item>
    <item>
      <title>Meet Ivan Leontev: From Junior to QA Engineer | SSH</title>
      <link>https://www.ssh.com/blog/meet-ivan-leontev-from-junior-to-qa-engineer-at-ssh</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/meet-ivan-leontev-from-junior-to-qa-engineer-at-ssh" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Ivan-Leontev-employer-branding-SoMe-badge.jpg" alt="Ivan Leontev holding a laptop at SSH's office " class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;Meet Ivan Leontev and his incredible journey from a Junior to a seasoned QA Engineer here at SSH. Ivan started his adventure with us a couple of years back in October 2021, joining the dynamic &lt;a href="https://www.ssh.com/products/privileged-access-management-privx"&gt;PrivX&lt;/a&gt; team.&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;As time passed, so did Ivan's growth within the company, making his career story truly inspiring.&amp;nbsp;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/meet-ivan-leontev-from-junior-to-qa-engineer-at-ssh" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Ivan-Leontev-employer-branding-SoMe-badge.jpg" alt="Ivan Leontev holding a laptop at SSH's office " class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;Meet Ivan Leontev and his incredible journey from a Junior to a seasoned QA Engineer here at SSH. Ivan started his adventure with us a couple of years back in October 2021, joining the dynamic &lt;a href="https://www.ssh.com/products/privileged-access-management-privx"&gt;PrivX&lt;/a&gt; team.&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;As time passed, so did Ivan's growth within the company, making his career story truly inspiring.&amp;nbsp;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Fmeet-ivan-leontev-from-junior-to-qa-engineer-at-ssh&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>SSH Careers</category>
      <category>Life at SSH</category>
      <pubDate>Wed, 31 Jan 2024 08:03:03 GMT</pubDate>
      <guid>https://www.ssh.com/blog/meet-ivan-leontev-from-junior-to-qa-engineer-at-ssh</guid>
      <dc:date>2024-01-31T08:03:03Z</dc:date>
      <dc:creator>Alina Preda</dc:creator>
    </item>
    <item>
      <title>IEC 62443 &amp; ISO 27001: FAQ with OT security experts | SSH</title>
      <link>https://www.ssh.com/blog/cybersecurity-regulations-iec-62443-and-iso-27001-faq-with-ot-security-experts</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/cybersecurity-regulations-iec-62443-and-iso-27001-faq-with-ot-security-experts" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/iec62443_iso27001_blog.jpg" alt="what is the EIC 62443 standard, what is ISO 27001" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span style="font-weight: bold;"&gt;&lt;span&gt;We have gathered three OT security professionals and asked them about two important &lt;/span&gt;&lt;span&gt;regulations, IEC &lt;/span&gt;&lt;span&gt;62443&lt;/span&gt;&lt;span&gt;&amp;nbsp;and ISO 27001 – what they are&lt;/span&gt;&lt;span&gt;, what are the connections between them,&lt;/span&gt;&lt;span&gt; and how to comply.&lt;/span&gt;&lt;span&gt; Read on to find out&lt;/span&gt;&lt;span&gt;.&lt;/span&gt; &lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/cybersecurity-regulations-iec-62443-and-iso-27001-faq-with-ot-security-experts" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/iec62443_iso27001_blog.jpg" alt="what is the EIC 62443 standard, what is ISO 27001" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span style="font-weight: bold;"&gt;&lt;span&gt;We have gathered three OT security professionals and asked them about two important &lt;/span&gt;&lt;span&gt;regulations, IEC &lt;/span&gt;&lt;span&gt;62443&lt;/span&gt;&lt;span&gt;&amp;nbsp;and ISO 27001 – what they are&lt;/span&gt;&lt;span&gt;, what are the connections between them,&lt;/span&gt;&lt;span&gt; and how to comply.&lt;/span&gt;&lt;span&gt; Read on to find out&lt;/span&gt;&lt;span&gt;.&lt;/span&gt; &lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Fcybersecurity-regulations-iec-62443-and-iso-27001-faq-with-ot-security-experts&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Operational Technology</category>
      <category>PrivX OT</category>
      <pubDate>Fri, 19 Jan 2024 09:00:00 GMT</pubDate>
      <author>zuzana.hutchinson@ssh.com (Zuzana Hutchinson)</author>
      <guid>https://www.ssh.com/blog/cybersecurity-regulations-iec-62443-and-iso-27001-faq-with-ot-security-experts</guid>
      <dc:date>2024-01-19T09:00:00Z</dc:date>
    </item>
    <item>
      <title>Terrapin Vulnerability in the SSH Protocol - How to Stay Secure | SSH</title>
      <link>https://www.ssh.com/blog/the-terrapin-attack-vulnerability-in-the-ssh-protocol-how-to-stay-secure</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/the-terrapin-attack-vulnerability-in-the-ssh-protocol-how-to-stay-secure" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/terrapin_attack_vulnerability.jpg" alt="terrapin vulnerability" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span style="font-weight: bold;"&gt;The &lt;/span&gt;&lt;a href="https://www.ssh.com/academy/ssh" style="font-weight: bold;"&gt;Secure Shell (SSH)&lt;/a&gt;&lt;span style="font-weight: bold;"&gt; is a widely-used protocol that provides (remote) secure access to servers, services, and applications - and between them for automated file transfers. These connections are measured in the millions per week.&amp;nbsp;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/the-terrapin-attack-vulnerability-in-the-ssh-protocol-how-to-stay-secure" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/terrapin_attack_vulnerability.jpg" alt="terrapin vulnerability" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span style="font-weight: bold;"&gt;The &lt;/span&gt;&lt;a href="https://www.ssh.com/academy/ssh" style="font-weight: bold;"&gt;Secure Shell (SSH)&lt;/a&gt;&lt;span style="font-weight: bold;"&gt; is a widely-used protocol that provides (remote) secure access to servers, services, and applications - and between them for automated file transfers. These connections are measured in the millions per week.&amp;nbsp;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Fthe-terrapin-attack-vulnerability-in-the-ssh-protocol-how-to-stay-secure&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>UKM</category>
      <category>risk management</category>
      <category>Secure Shell</category>
      <category>SSH Protocol</category>
      <pubDate>Tue, 09 Jan 2024 08:07:14 GMT</pubDate>
      <guid>https://www.ssh.com/blog/the-terrapin-attack-vulnerability-in-the-ssh-protocol-how-to-stay-secure</guid>
      <dc:date>2024-01-09T08:07:14Z</dc:date>
      <dc:creator>Juuso Jahnukainen</dc:creator>
    </item>
    <item>
      <title>Cybersecurity Trends to Look Out for in 2024 | SSH</title>
      <link>https://www.ssh.com/blog/cybersecurity-trends-to-look-out-for-in-2024</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/cybersecurity-trends-to-look-out-for-in-2024" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/cybersecurity_2024.jpg" alt="cybersecurity trends 2024" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;The importance of cybersecurity has been on the rise for a while now. In 2024, &lt;span style="font-weight: bold;"&gt;cybersecurity will make its way into boardrooms, enter the AI battlefield, or change how businesses juggle their trade secrets and sensitive communications&lt;/span&gt;.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Here are our top 8 cybersecurity trends to look out for in 2024:&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/cybersecurity-trends-to-look-out-for-in-2024" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/cybersecurity_2024.jpg" alt="cybersecurity trends 2024" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;The importance of cybersecurity has been on the rise for a while now. In 2024, &lt;span style="font-weight: bold;"&gt;cybersecurity will make its way into boardrooms, enter the AI battlefield, or change how businesses juggle their trade secrets and sensitive communications&lt;/span&gt;.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Here are our top 8 cybersecurity trends to look out for in 2024:&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Fcybersecurity-trends-to-look-out-for-in-2024&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Zero Trust</category>
      <category>Operational Technology</category>
      <category>PQC</category>
      <category>secure communications</category>
      <pubDate>Mon, 08 Jan 2024 08:33:26 GMT</pubDate>
      <author>jani.virkkula@ssh.com (Jani Virkkula)</author>
      <guid>https://www.ssh.com/blog/cybersecurity-trends-to-look-out-for-in-2024</guid>
      <dc:date>2024-01-08T08:33:26Z</dc:date>
    </item>
    <item>
      <title>The Future of Industrial Remote Access: Software-Based OT Solutions</title>
      <link>https://www.ssh.com/blog/software-based-ot-solutions-are-the-future-of-industrial-remote-access</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/software-based-ot-solutions-are-the-future-of-industrial-remote-access" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/future-of-industrial-remote-access-blog-post-some-badge.jpg" alt="The Future of Industrial Remote Access: Software-Based OT Solutions" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;For over a decade, the adaptation of remote access and data acquisition technologies in industrial applications has been increasing rapidly, while the number of competitors, as well as their complexity, has grown day by day.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/software-based-ot-solutions-are-the-future-of-industrial-remote-access" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/future-of-industrial-remote-access-blog-post-some-badge.jpg" alt="The Future of Industrial Remote Access: Software-Based OT Solutions" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;For over a decade, the adaptation of remote access and data acquisition technologies in industrial applications has been increasing rapidly, while the number of competitors, as well as their complexity, has grown day by day.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Fsoftware-based-ot-solutions-are-the-future-of-industrial-remote-access&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>OT security</category>
      <category>PrivX OT</category>
      <pubDate>Fri, 05 Jan 2024 11:00:07 GMT</pubDate>
      <author>eduardo.giancristofaro@ssh.com (Eduardo Giancristofaro)</author>
      <guid>https://www.ssh.com/blog/software-based-ot-solutions-are-the-future-of-industrial-remote-access</guid>
      <dc:date>2024-01-05T11:00:07Z</dc:date>
    </item>
    <item>
      <title>Biometric authentication with PrivX Authorizer | SSH</title>
      <link>https://www.ssh.com/blog/introducing-biometric-authentication-with-privx-authorizer</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/introducing-biometric-authentication-with-privx-authorizer" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/PrivX%20Authoriser.jpg" alt="privx authorizer" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;&lt;span style="font-weight: bold;"&gt;Biometric authentication&lt;/span&gt; is becoming more and more popular in today’s digitalized world, revolutionizing the way we secure our digital identities due to its &lt;span style="font-weight: bold;"&gt;efficiency&lt;/span&gt;, &lt;span style="font-weight: bold;"&gt;accuracy&lt;/span&gt;, and &lt;span style="font-weight: bold;"&gt;enhanced security features&lt;/span&gt;. &lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/introducing-biometric-authentication-with-privx-authorizer" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/PrivX%20Authoriser.jpg" alt="privx authorizer" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;&lt;span style="font-weight: bold;"&gt;Biometric authentication&lt;/span&gt; is becoming more and more popular in today’s digitalized world, revolutionizing the way we secure our digital identities due to its &lt;span style="font-weight: bold;"&gt;efficiency&lt;/span&gt;, &lt;span style="font-weight: bold;"&gt;accuracy&lt;/span&gt;, and &lt;span style="font-weight: bold;"&gt;enhanced security features&lt;/span&gt;. &lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Fintroducing-biometric-authentication-with-privx-authorizer&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>PrivX</category>
      <category>Multi-Factor Authentication</category>
      <pubDate>Tue, 19 Dec 2023 08:36:19 GMT</pubDate>
      <author>ilpo.ruohonen@ssh.com (Ilpo Ruohonen)</author>
      <guid>https://www.ssh.com/blog/introducing-biometric-authentication-with-privx-authorizer</guid>
      <dc:date>2023-12-19T08:36:19Z</dc:date>
    </item>
    <item>
      <title>Cybersecurity 2023: End-of-the-year overview of trends and hacks | SSH</title>
      <link>https://www.ssh.com/blog/cybersecurity-2023-overview-of-the-most-impactful-trends-and-hacks</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/cybersecurity-2023-overview-of-the-most-impactful-trends-and-hacks" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/cybersecurity_2023_end-of-the-year_overview.jpg" alt="cybersecurity 2023, defensive cybersecurity" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;2023 was the year of cybersecurity – with new trends entering the market and massive hacks and data breaches shaking the industry at its core.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Here’s our overview of the most important trends and hacks of 2023.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;&lt;br&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/cybersecurity-2023-overview-of-the-most-impactful-trends-and-hacks" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/cybersecurity_2023_end-of-the-year_overview.jpg" alt="cybersecurity 2023, defensive cybersecurity" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;2023 was the year of cybersecurity – with new trends entering the market and massive hacks and data breaches shaking the industry at its core.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Here’s our overview of the most important trends and hacks of 2023.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;&lt;br&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Fcybersecurity-2023-overview-of-the-most-impactful-trends-and-hacks&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Zero Trust</category>
      <category>Post-Quantum Cryptography</category>
      <category>secure communications</category>
      <category>OT security</category>
      <category>Zero Trust Suite</category>
      <pubDate>Wed, 13 Dec 2023 11:03:55 GMT</pubDate>
      <author>zuzana.hutchinson@ssh.com (Zuzana Hutchinson)</author>
      <guid>https://www.ssh.com/blog/cybersecurity-2023-overview-of-the-most-impactful-trends-and-hacks</guid>
      <dc:date>2023-12-13T11:03:55Z</dc:date>
    </item>
    <item>
      <title>Meet Pelin Tüfekçi: An inspiring story at SSH | SSH</title>
      <link>https://www.ssh.com/blog/meet-pelin-tufekci-an-inspiring-story-about-determination-and-dedication-at-ssh</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/meet-pelin-tufekci-an-inspiring-story-about-determination-and-dedication-at-ssh" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/SSH%20blog%20employee%20Pelin-02-1.jpg" alt="Meet Pelin Tüfekçi: An inspiring story at SSH | SSH" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;Meet &lt;/span&gt;&lt;span&gt;Pelin&lt;/span&gt;&lt;span&gt;Tüfekçi&lt;/span&gt;&lt;span&gt;, &lt;/span&gt;&lt;span&gt;our&lt;/span&gt;&lt;span&gt; Product Manager for&lt;/span&gt;&lt;span&gt; the &lt;a href="https://www.ssh.com/solutions/ssh-secure-collaboration"&gt;Secure Collaboration product portfolio&lt;/a&gt;. &lt;/span&gt;&lt;span&gt;Originally from Istanbul, she fell in love with Helsinki first, and shortly afterward she joined our SSH family. Here, Pelin found the com&lt;/span&gt;&lt;span&gt;plexity of cybersecurity both daunting and thrilling. &lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/meet-pelin-tufekci-an-inspiring-story-about-determination-and-dedication-at-ssh" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/SSH%20blog%20employee%20Pelin-02-1.jpg" alt="Meet Pelin Tüfekçi: An inspiring story at SSH | SSH" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;Meet &lt;/span&gt;&lt;span&gt;Pelin&lt;/span&gt;&lt;span&gt;Tüfekçi&lt;/span&gt;&lt;span&gt;, &lt;/span&gt;&lt;span&gt;our&lt;/span&gt;&lt;span&gt; Product Manager for&lt;/span&gt;&lt;span&gt; the &lt;a href="https://www.ssh.com/solutions/ssh-secure-collaboration"&gt;Secure Collaboration product portfolio&lt;/a&gt;. &lt;/span&gt;&lt;span&gt;Originally from Istanbul, she fell in love with Helsinki first, and shortly afterward she joined our SSH family. Here, Pelin found the com&lt;/span&gt;&lt;span&gt;plexity of cybersecurity both daunting and thrilling. &lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Fmeet-pelin-tufekci-an-inspiring-story-about-determination-and-dedication-at-ssh&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>SSH Careers</category>
      <category>Life at SSH</category>
      <pubDate>Tue, 05 Dec 2023 07:54:23 GMT</pubDate>
      <guid>https://www.ssh.com/blog/meet-pelin-tufekci-an-inspiring-story-about-determination-and-dedication-at-ssh</guid>
      <dc:date>2023-12-05T07:54:23Z</dc:date>
      <dc:creator>Alina Preda</dc:creator>
    </item>
    <item>
      <title>4 reasons why passwords are NOT reliable anymore | SSH</title>
      <link>https://www.ssh.com/blog/why-passwords-are-not-reliable-anymore</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/why-passwords-are-not-reliable-anymore" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/passwords_are_not_reliable_anymore-01.jpg" alt="4 reasons why passwords are NOT reliable anymore | SSH" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;&lt;em&gt;This article was originally published 17th of November 2023 and since been updated with new content.&lt;/em&gt;&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;Are passwords as secure as we once thought? In today's ever-evolving digital world, relying solely on passwords to safeguard our information may no longer be enough. From cyberattacks to data breaches, there are three key reasons why passwords are no longer as reliable as they used to be. Stay informed to protect yourself in this increasingly complex online world.&lt;br&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/why-passwords-are-not-reliable-anymore" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/passwords_are_not_reliable_anymore-01.jpg" alt="4 reasons why passwords are NOT reliable anymore | SSH" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;&lt;em&gt;This article was originally published 17th of November 2023 and since been updated with new content.&lt;/em&gt;&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;Are passwords as secure as we once thought? In today's ever-evolving digital world, relying solely on passwords to safeguard our information may no longer be enough. From cyberattacks to data breaches, there are three key reasons why passwords are no longer as reliable as they used to be. Stay informed to protect yourself in this increasingly complex online world.&lt;br&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Fwhy-passwords-are-not-reliable-anymore&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Zero Trust</category>
      <category>passwordless</category>
      <category>Zero Trust Suite</category>
      <pubDate>Fri, 17 Nov 2023 08:11:00 GMT</pubDate>
      <guid>https://www.ssh.com/blog/why-passwords-are-not-reliable-anymore</guid>
      <dc:date>2023-11-17T08:11:00Z</dc:date>
      <dc:creator>Juuso Jahnukainen</dc:creator>
    </item>
    <item>
      <title>Meet Jani Virkkula: A Journey of Professionalism and Passion | SSH</title>
      <link>https://www.ssh.com/blog/meet-jani-virkkula-journey-of-professionalism-and-passion-at-ssh</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/meet-jani-virkkula-journey-of-professionalism-and-passion-at-ssh" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Jani-Virkkula-social-badge-2.jpg" alt="Meet Jani Virkkula: A Journey of Professionalism and Passion | SSH" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;&lt;span style="font-weight: bold;"&gt;Meet Jani Virkkula, our Product Marketing Manager for the EMEA region, whose journey at SSH kicked off with a hint of humor, joining the company on April 1, 2018, often referred to as April Fools' Day.&lt;/span&gt; &lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Before his SSH days, Jani had been working within the telecommunications field, transitioning into marketing from a background steeped in technical documentation.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/meet-jani-virkkula-journey-of-professionalism-and-passion-at-ssh" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Jani-Virkkula-social-badge-2.jpg" alt="Meet Jani Virkkula: A Journey of Professionalism and Passion | SSH" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;&lt;span style="font-weight: bold;"&gt;Meet Jani Virkkula, our Product Marketing Manager for the EMEA region, whose journey at SSH kicked off with a hint of humor, joining the company on April 1, 2018, often referred to as April Fools' Day.&lt;/span&gt; &lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Before his SSH days, Jani had been working within the telecommunications field, transitioning into marketing from a background steeped in technical documentation.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Fmeet-jani-virkkula-journey-of-professionalism-and-passion-at-ssh&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>SSH Careers</category>
      <category>Life at SSH</category>
      <pubDate>Fri, 10 Nov 2023 10:55:55 GMT</pubDate>
      <guid>https://www.ssh.com/blog/meet-jani-virkkula-journey-of-professionalism-and-passion-at-ssh</guid>
      <dc:date>2023-11-10T10:55:55Z</dc:date>
      <dc:creator>Alina Preda</dc:creator>
    </item>
    <item>
      <title>How should you respond to the theft of your identity: Real-life tips</title>
      <link>https://www.ssh.com/blog/how-to-respond-to-identity-theft-learnings-from-real-life-example</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/how-to-respond-to-identity-theft-learnings-from-real-life-example" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/identity_theft.jpg" alt="identity theft, how to respond to identity theft" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;Identity theft isn’t a new threat within the cyberthreat landscape. But if you’re online (and who isn’t nowadays), it is something you need to be aware of and beware of.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Here are just a few reasons &lt;a href="https://identitytheft.org/statistics/"&gt;why identity theft should be on your radar&lt;/a&gt; right now:&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;span&gt;The number of identity theft cases started growing rapidly in early 2020, estimated to reach its all-time high in 2023.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span&gt;In 2022, the Federal Trade Commission (FTC) registered 1.4 million cases – that's 25% of all FTC reports.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span&gt;It’s estimated that a third of US citizens faced identity theft at some point in their lives, and the probability of a US citizen facing identity theft is 3x higher than in other countries.&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/li&gt; 
&lt;/ul&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/how-to-respond-to-identity-theft-learnings-from-real-life-example" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/identity_theft.jpg" alt="identity theft, how to respond to identity theft" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;Identity theft isn’t a new threat within the cyberthreat landscape. But if you’re online (and who isn’t nowadays), it is something you need to be aware of and beware of.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Here are just a few reasons &lt;a href="https://identitytheft.org/statistics/"&gt;why identity theft should be on your radar&lt;/a&gt; right now:&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;&lt;span&gt;The number of identity theft cases started growing rapidly in early 2020, estimated to reach its all-time high in 2023.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span&gt;In 2022, the Federal Trade Commission (FTC) registered 1.4 million cases – that's 25% of all FTC reports.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt; 
 &lt;li&gt;&lt;span&gt;It’s estimated that a third of US citizens faced identity theft at some point in their lives, and the probability of a US citizen facing identity theft is 3x higher than in other countries.&lt;/span&gt;&lt;span&gt; &lt;/span&gt;&lt;/li&gt; 
&lt;/ul&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Fhow-to-respond-to-identity-theft-learnings-from-real-life-example&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>secure communications</category>
      <category>Deltagon Suite</category>
      <pubDate>Tue, 07 Nov 2023 08:30:00 GMT</pubDate>
      <author>zuzana.hutchinson@ssh.com (Zuzana Hutchinson)</author>
      <guid>https://www.ssh.com/blog/how-to-respond-to-identity-theft-learnings-from-real-life-example</guid>
      <dc:date>2023-11-07T08:30:00Z</dc:date>
    </item>
    <item>
      <title>3 Tips on Securing OT in the Age of Digital Transformation | SSH</title>
      <link>https://www.ssh.com/blog/tips-on-securing-ot-in-the-digital-age</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/tips-on-securing-ot-in-the-digital-age" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/tips_on_securing_OT.jpg" alt="OT security, securing OT" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;Operational Technology (OT) and manufacturing businesses are prime targets for cybercriminals. Why? Because OT security is lacking behind &lt;span&gt;&lt;span&gt;the&lt;/span&gt;&lt;span&gt;IT &lt;/span&gt;&lt;span&gt;sector&lt;/span&gt;&lt;span&gt;, such as&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;banking &lt;/span&gt;&lt;span&gt;and&lt;/span&gt;&lt;span&gt; retail&lt;/span&gt;&lt;/span&gt;.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;For example, ransomware attacks on OT systems are on the rise with twice as many attacks in 2022 than the previous year. And the estimates are that more than half of OT and manufacturing businesses were hit by ransomware in 2023, with more than a third of them losing business and revenue as a result (according to the State of Ransomware 2023 report).&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;The message from OT security experts is clear: &lt;span style="font-weight: bold;"&gt;Don’t wait to modernize and renew your systems – adapt and bypass your system limitations now.&lt;/span&gt;&lt;/span&gt;&lt;span style="font-weight: bold;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Here are three key tips on how you can secure your OT environment for the digital age.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/tips-on-securing-ot-in-the-digital-age" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/tips_on_securing_OT.jpg" alt="OT security, securing OT" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;Operational Technology (OT) and manufacturing businesses are prime targets for cybercriminals. Why? Because OT security is lacking behind &lt;span&gt;&lt;span&gt;the&lt;/span&gt;&lt;span&gt;IT &lt;/span&gt;&lt;span&gt;sector&lt;/span&gt;&lt;span&gt;, such as&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;banking &lt;/span&gt;&lt;span&gt;and&lt;/span&gt;&lt;span&gt; retail&lt;/span&gt;&lt;/span&gt;.&amp;nbsp;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;For example, ransomware attacks on OT systems are on the rise with twice as many attacks in 2022 than the previous year. And the estimates are that more than half of OT and manufacturing businesses were hit by ransomware in 2023, with more than a third of them losing business and revenue as a result (according to the State of Ransomware 2023 report).&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;The message from OT security experts is clear: &lt;span style="font-weight: bold;"&gt;Don’t wait to modernize and renew your systems – adapt and bypass your system limitations now.&lt;/span&gt;&lt;/span&gt;&lt;span style="font-weight: bold;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Here are three key tips on how you can secure your OT environment for the digital age.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Ftips-on-securing-ot-in-the-digital-age&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>OT security</category>
      <category>PrivX OT</category>
      <pubDate>Mon, 30 Oct 2023 07:57:49 GMT</pubDate>
      <author>eduardo.giancristofaro@ssh.com (Eduardo Giancristofaro)</author>
      <guid>https://www.ssh.com/blog/tips-on-securing-ot-in-the-digital-age</guid>
      <dc:date>2023-10-30T07:57:49Z</dc:date>
    </item>
    <item>
      <title>How to secure your business communications using Zero Trust | SSH</title>
      <link>https://www.ssh.com/blog/how-to-secure-business-communications-using-zero-trust</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/how-to-secure-business-communications-using-zero-trust" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/Secure-business-communications-with-ZT-01.jpg" alt="secure business communications, Zero Trust" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span style="font-weight: bold;"&gt;Zero Trust is a common concept in cybersecurity these days. As a theoretical model, Zero Trust redefines how businesses think about and secure their IT environments – leaning away from perimeter security toward perimeter-less. The Zero Trust principle can also be&amp;nbsp;used to secure your business communications.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Let's look at how you can implement Zero Trust for secure business communications in practice.&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/how-to-secure-business-communications-using-zero-trust" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/Secure-business-communications-with-ZT-01.jpg" alt="secure business communications, Zero Trust" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span style="font-weight: bold;"&gt;Zero Trust is a common concept in cybersecurity these days. As a theoretical model, Zero Trust redefines how businesses think about and secure their IT environments – leaning away from perimeter security toward perimeter-less. The Zero Trust principle can also be&amp;nbsp;used to secure your business communications.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;Let's look at how you can implement Zero Trust for secure business communications in practice.&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Fhow-to-secure-business-communications-using-zero-trust&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>secure communications</category>
      <category>Secure Data Sharing</category>
      <category>Deltagon Suite</category>
      <pubDate>Fri, 06 Oct 2023 08:00:00 GMT</pubDate>
      <guid>https://www.ssh.com/blog/how-to-secure-business-communications-using-zero-trust</guid>
      <dc:date>2023-10-06T08:00:00Z</dc:date>
      <dc:creator>Maarit Asikainen</dc:creator>
    </item>
    <item>
      <title>The impact of the NIS2 directive on OT businesses | SSH</title>
      <link>https://www.ssh.com/blog/the-impact-of-the-nis2-directive-on-ot-businesses</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/the-impact-of-the-nis2-directive-on-ot-businesses" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/NIS2-for-OT-01.jpg" alt="NIS2 directive for OT" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;The industrial digitalization that started over 20 years ago accelerated rapidly in recent years, particularly in the field of operational technology (OT). This evolution made critical infrastructure more connected but also more vulnerable to cyber threats.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/the-impact-of-the-nis2-directive-on-ot-businesses" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/NIS2-for-OT-01.jpg" alt="NIS2 directive for OT" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;The industrial digitalization that started over 20 years ago accelerated rapidly in recent years, particularly in the field of operational technology (OT). This evolution made critical infrastructure more connected but also more vulnerable to cyber threats.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Fthe-impact-of-the-nis2-directive-on-ot-businesses&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>NIS directive</category>
      <category>OT security</category>
      <category>PrivX OT</category>
      <pubDate>Thu, 21 Sep 2023 07:24:43 GMT</pubDate>
      <author>jani.virkkula@ssh.com (Jani Virkkula)</author>
      <guid>https://www.ssh.com/blog/the-impact-of-the-nis2-directive-on-ot-businesses</guid>
      <dc:date>2023-09-21T07:24:43Z</dc:date>
    </item>
    <item>
      <title>5 secure data sharing challenges in healthcare | SSH</title>
      <link>https://www.ssh.com/blog/5-secure-data-sharing-challenges-in-healthcare</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/5-secure-data-sharing-challenges-in-healthcare" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/secure-data-sharing-challenges-healthcare-01.jpg" alt="secure healthcare data sharing, secure data sharing in healthcare, secure data sharing challenges in healthcare" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;Sharing medical and health data has many benefits not just for healthcare providers and professionals but also for patients - yet the security when sharing healthcare data is still a challenge.&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;Let’s look at the five most common challenges that healthcare providers experience when sharing sensitive health data.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/5-secure-data-sharing-challenges-in-healthcare" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/secure-data-sharing-challenges-healthcare-01.jpg" alt="secure healthcare data sharing, secure data sharing in healthcare, secure data sharing challenges in healthcare" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;Sharing medical and health data has many benefits not just for healthcare providers and professionals but also for patients - yet the security when sharing healthcare data is still a challenge.&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;Let’s look at the five most common challenges that healthcare providers experience when sharing sensitive health data.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2F5-secure-data-sharing-challenges-in-healthcare&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Tectia SSH</category>
      <category>Secure Data Sharing</category>
      <category>Deltagon Suite</category>
      <category>Zero Trust Suite</category>
      <pubDate>Thu, 14 Sep 2023 07:05:33 GMT</pubDate>
      <author>jani.virkkula@ssh.com (Jani Virkkula)</author>
      <guid>https://www.ssh.com/blog/5-secure-data-sharing-challenges-in-healthcare</guid>
      <dc:date>2023-09-14T07:05:33Z</dc:date>
    </item>
    <item>
      <title>5 ways quantum computers will positively impact our future | SSH</title>
      <link>https://www.ssh.com/blog/5-ways-quantum-computers-will-positively-impact-the-future-of-technology</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/5-ways-quantum-computers-will-positively-impact-the-future-of-technology" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/quantum-computers-positive-impact-01.jpg" alt="quantum computers, PQC" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: justify; font-weight: bold;"&gt;In computing, innovative technology is on the horizon, poised to reshape our world as we know it. Quantum computers, powered by the principles of quantum mechanics, hold the promise of revolutionizing industries, solving complex problems, and unlocking new frontiers of knowledge.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/5-ways-quantum-computers-will-positively-impact-the-future-of-technology" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/quantum-computers-positive-impact-01.jpg" alt="quantum computers, PQC" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="text-align: justify; font-weight: bold;"&gt;In computing, innovative technology is on the horizon, poised to reshape our world as we know it. Quantum computers, powered by the principles of quantum mechanics, hold the promise of revolutionizing industries, solving complex problems, and unlocking new frontiers of knowledge.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2F5-ways-quantum-computers-will-positively-impact-the-future-of-technology&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>quantum-safe</category>
      <category>Post-Quantum Cryptography</category>
      <category>quantum computers</category>
      <pubDate>Fri, 08 Sep 2023 07:00:00 GMT</pubDate>
      <author>jani.virkkula@ssh.com (Jani Virkkula)</author>
      <guid>https://www.ssh.com/blog/5-ways-quantum-computers-will-positively-impact-the-future-of-technology</guid>
      <dc:date>2023-09-08T07:00:00Z</dc:date>
    </item>
    <item>
      <title>Healthcare data security: Why is your health data in danger? | SSH</title>
      <link>https://www.ssh.com/blog/healthcare-data-security-why-is-health-data-in-danger</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/healthcare-data-security-why-is-health-data-in-danger" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/healthcare-data-security-01.jpg" alt="healthcare data security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;The progress of digitalization in the healthcare industry undeniably reached a new high in the last few years. With advances in cloud computing, Artificial Intelligence (AI), and new software, healthcare is quickly becoming an industry that heavily relies on modern IT, taking in its advantages as well as risks.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/healthcare-data-security-why-is-health-data-in-danger" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/healthcare-data-security-01.jpg" alt="healthcare data security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;The progress of digitalization in the healthcare industry undeniably reached a new high in the last few years. With advances in cloud computing, Artificial Intelligence (AI), and new software, healthcare is quickly becoming an industry that heavily relies on modern IT, taking in its advantages as well as risks.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Fhealthcare-data-security-why-is-health-data-in-danger&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>healthcare</category>
      <category>Zero Trust</category>
      <category>Secure Data Sharing</category>
      <category>Zero Trust Suite</category>
      <pubDate>Wed, 30 Aug 2023 07:00:00 GMT</pubDate>
      <author>jani.virkkula@ssh.com (Jani Virkkula)</author>
      <guid>https://www.ssh.com/blog/healthcare-data-security-why-is-health-data-in-danger</guid>
      <dc:date>2023-08-30T07:00:00Z</dc:date>
    </item>
    <item>
      <title>Your data is at risk from quantum computers now. Here’s why. | SSH</title>
      <link>https://www.ssh.com/blog/why-is-it-important-to-start-protecting-your-data-from-quantum-computers-now</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/why-is-it-important-to-start-protecting-your-data-from-quantum-computers-now" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/quantum-safe-migration-01.jpg" alt="quantum-safe cryptography, quantum threat, QSC" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;&lt;span&gt;Quantum computers exist as we speak. While their full potential will still be years in the making, your business needs to start upping the ante on the encryption game without delay.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/why-is-it-important-to-start-protecting-your-data-from-quantum-computers-now" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/quantum-safe-migration-01.jpg" alt="quantum-safe cryptography, quantum threat, QSC" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;&lt;span&gt;Quantum computers exist as we speak. While their full potential will still be years in the making, your business needs to start upping the ante on the encryption game without delay.&amp;nbsp;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Fwhy-is-it-important-to-start-protecting-your-data-from-quantum-computers-now&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>quantum-safe</category>
      <category>Post-Quantum Cryptography</category>
      <category>quantum computers</category>
      <pubDate>Thu, 13 Jul 2023 07:30:00 GMT</pubDate>
      <author>jani.virkkula@ssh.com (Jani Virkkula)</author>
      <guid>https://www.ssh.com/blog/why-is-it-important-to-start-protecting-your-data-from-quantum-computers-now</guid>
      <dc:date>2023-07-13T07:30:00Z</dc:date>
    </item>
    <item>
      <title>Why critical infrastructure needs modern OT cybersecurity? | SSH</title>
      <link>https://www.ssh.com/blog/why-modern-ot-cybersecurity-for-critical-infrastructure-businesses</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/why-modern-ot-cybersecurity-for-critical-infrastructure-businesses" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/ot_cybersecurity_for_critical_infrastructure-01.jpg" alt="ot cybersecurity, modern ot cybersecurity, critical infrastructure" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;Operational Technology (OT) systems become more and more interconnected nowadays. So, it is pivotal to address the associated OT cybersecurity risks to safeguard critical infrastructure and ensure the resilience of industrial operations in the face of evolving technological landscapes.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/why-modern-ot-cybersecurity-for-critical-infrastructure-businesses" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/ot_cybersecurity_for_critical_infrastructure-01.jpg" alt="ot cybersecurity, modern ot cybersecurity, critical infrastructure" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;Operational Technology (OT) systems become more and more interconnected nowadays. So, it is pivotal to address the associated OT cybersecurity risks to safeguard critical infrastructure and ensure the resilience of industrial operations in the face of evolving technological landscapes.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Fwhy-modern-ot-cybersecurity-for-critical-infrastructure-businesses&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Operational Technology</category>
      <category>OT security</category>
      <category>PrivX OT</category>
      <pubDate>Mon, 03 Jul 2023 08:00:00 GMT</pubDate>
      <author>ilpo.ruohonen@ssh.com (Ilpo Ruohonen)</author>
      <guid>https://www.ssh.com/blog/why-modern-ot-cybersecurity-for-critical-infrastructure-businesses</guid>
      <dc:date>2023-07-03T08:00:00Z</dc:date>
    </item>
    <item>
      <title>OT cybersecurity: Ports and terminals at risk of cyberattacks | SSH</title>
      <link>https://www.ssh.com/blog/ot-cybersecurity-ports-and-terminals-at-risk</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/ot-cybersecurity-ports-and-terminals-at-risk" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/ot_cybersecurity_ports_terminals-01.jpg" alt="ot cybersecurity" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;&lt;span&gt;&lt;span&gt;If you would want to take down an entire country, what would you do? Would you &lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;use &lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;physic&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;al weapons or utilize cyber resources? &lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;What or who would be your first target&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;?&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/ot-cybersecurity-ports-and-terminals-at-risk" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/ot_cybersecurity_ports_terminals-01.jpg" alt="ot cybersecurity" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;&lt;span&gt;&lt;span&gt;If you would want to take down an entire country, what would you do? Would you &lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;use &lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;physic&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;al weapons or utilize cyber resources? &lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;What or who would be your first target&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;?&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Fot-cybersecurity-ports-and-terminals-at-risk&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Operational Technology</category>
      <category>OT security</category>
      <category>PrivX OT</category>
      <pubDate>Mon, 26 Jun 2023 08:27:30 GMT</pubDate>
      <guid>https://www.ssh.com/blog/ot-cybersecurity-ports-and-terminals-at-risk</guid>
      <dc:date>2023-06-26T08:27:30Z</dc:date>
      <dc:creator>Antti Kaunonen</dc:creator>
    </item>
    <item>
      <title>Modern OT Cybersecurity: Why Does It Matter? | SSH</title>
      <link>https://www.ssh.com/blog/cybersecurity-in-ot-why-does-it-matter</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/cybersecurity-in-ot-why-does-it-matter" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/ot_cybersecurity_why_it_matters-01.jpg" alt="modern OT, OT cybersecurity, operational technology cyebrsecurity, OT security, operational technology" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;The gap between potential and current capabilities within the industrial operations segment is rapidly widening due to industrial businesses not modernizing fast enough. This includes industries such as mining, energy, or manufacturing, to name a few. Hence, the integration of modern technology within industrial operations has become a must-have. If industrial automation and manufacturing businesses want to maintain their competitive advantage, company profitability, and increased visibility within the industry, they must modernize, just like any other business.&amp;nbsp;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/cybersecurity-in-ot-why-does-it-matter" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/ot_cybersecurity_why_it_matters-01.jpg" alt="modern OT, OT cybersecurity, operational technology cyebrsecurity, OT security, operational technology" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;The gap between potential and current capabilities within the industrial operations segment is rapidly widening due to industrial businesses not modernizing fast enough. This includes industries such as mining, energy, or manufacturing, to name a few. Hence, the integration of modern technology within industrial operations has become a must-have. If industrial automation and manufacturing businesses want to maintain their competitive advantage, company profitability, and increased visibility within the industry, they must modernize, just like any other business.&amp;nbsp;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Fcybersecurity-in-ot-why-does-it-matter&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Operational Technology</category>
      <category>OT security</category>
      <category>PrivX OT</category>
      <pubDate>Tue, 20 Jun 2023 06:45:01 GMT</pubDate>
      <author>ilpo.ruohonen@ssh.com (Ilpo Ruohonen)</author>
      <guid>https://www.ssh.com/blog/cybersecurity-in-ot-why-does-it-matter</guid>
      <dc:date>2023-06-20T06:45:01Z</dc:date>
    </item>
    <item>
      <title>Zero Trust and Secure Remote Access for OT Cybersecurity | SSH</title>
      <link>https://www.ssh.com/blog/zero-trust-and-secure-remote-access-for-ot-cybersecurity</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/zero-trust-and-secure-remote-access-for-ot-cybersecurity" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/ot_cybersecurity_secure_remote_access_zero_trust-01.jpg" alt="remote access security, ot cybersecurity" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;&lt;span&gt;&lt;span&gt;The Fourth Industrial Revolution, &lt;/span&gt;&lt;span&gt;also known as &lt;/span&gt;&lt;span&gt;4IR or Industry 4.0, &lt;/span&gt;&lt;span&gt;refers to&lt;/span&gt;&lt;span&gt; industries, technologies&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;,&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt; and processes&lt;/span&gt;&lt;span&gt;that are under pressure to &lt;/span&gt;&lt;span&gt;upgrade their game as &lt;/span&gt;&lt;span&gt;the demand&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt; for &lt;/span&gt;&lt;span&gt;interconnectivity and smart automation&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;increases &lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;dramatically. This puts secure remote OT access at the center of OT security&lt;/span&gt;&lt;span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/zero-trust-and-secure-remote-access-for-ot-cybersecurity" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/ot_cybersecurity_secure_remote_access_zero_trust-01.jpg" alt="remote access security, ot cybersecurity" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;&lt;span&gt;&lt;span&gt;The Fourth Industrial Revolution, &lt;/span&gt;&lt;span&gt;also known as &lt;/span&gt;&lt;span&gt;4IR or Industry 4.0, &lt;/span&gt;&lt;span&gt;refers to&lt;/span&gt;&lt;span&gt; industries, technologies&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;,&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt; and processes&lt;/span&gt;&lt;span&gt;that are under pressure to &lt;/span&gt;&lt;span&gt;upgrade their game as &lt;/span&gt;&lt;span&gt;the demand&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt; for &lt;/span&gt;&lt;span&gt;interconnectivity and smart automation&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;increases &lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;dramatically. This puts secure remote OT access at the center of OT security&lt;/span&gt;&lt;span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Fzero-trust-and-secure-remote-access-for-ot-cybersecurity&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Operational Technology</category>
      <category>OT security</category>
      <category>PrivX OT</category>
      <pubDate>Fri, 21 Apr 2023 08:20:08 GMT</pubDate>
      <author>jani.virkkula@ssh.com (Jani Virkkula)</author>
      <guid>https://www.ssh.com/blog/zero-trust-and-secure-remote-access-for-ot-cybersecurity</guid>
      <dc:date>2023-04-21T08:20:08Z</dc:date>
    </item>
    <item>
      <title>Open-Source SSH: When Free Is Not Free | SSH</title>
      <link>https://www.ssh.com/blog/open-source-ssh-costs</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/open-source-ssh-costs" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/open-source_ssh-01.jpg" alt="open source ssh, openssh" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;Free software, also known as open-source software, sounds like a good way to cut already high IT costs. As the name suggests, it's free, thus it shouldn't cost anything. But is it really that simple? Let's find out.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/open-source-ssh-costs" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/open-source_ssh-01.jpg" alt="open source ssh, openssh" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;Free software, also known as open-source software, sounds like a good way to cut already high IT costs. As the name suggests, it's free, thus it shouldn't cost anything. But is it really that simple? Let's find out.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Fopen-source-ssh-costs&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Tectia SSH</category>
      <category>OpenSSH</category>
      <pubDate>Fri, 14 Apr 2023 07:07:54 GMT</pubDate>
      <guid>https://www.ssh.com/blog/open-source-ssh-costs</guid>
      <dc:date>2023-04-14T07:07:54Z</dc:date>
      <dc:creator>Jussi Rautio</dc:creator>
    </item>
    <item>
      <title>How to manage SSH keys without key vaults | SSH</title>
      <link>https://www.ssh.com/blog/best-way-to-manage-ssh-keys-without-key-vaults</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/best-way-to-manage-ssh-keys-without-key-vaults" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/encryption-key-vaulting-01.jpg" alt="encryption key vaults, SSH key vaults, vaulting encryption keys" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;&lt;span&gt;Credentials and &lt;/span&gt;&lt;span&gt;secrets&lt;/span&gt;&lt;span&gt; management often focus on passwords. &lt;/span&gt;&lt;span&gt;But there are &lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;also &lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;other credentials, like &lt;/span&gt;&lt;/span&gt;&lt;a href="https://www.ssh.com/academy/ssh-keys"&gt;&lt;span&gt;&lt;span&gt;SSH keys&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;, that serve the same purpose as passwords in the sense that they are access credentials just as well&lt;/span&gt;&lt;span&gt; and, at the same time, are overlooked&lt;/span&gt;&lt;span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/best-way-to-manage-ssh-keys-without-key-vaults" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/encryption-key-vaulting-01.jpg" alt="encryption key vaults, SSH key vaults, vaulting encryption keys" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;&lt;span&gt;Credentials and &lt;/span&gt;&lt;span&gt;secrets&lt;/span&gt;&lt;span&gt; management often focus on passwords. &lt;/span&gt;&lt;span&gt;But there are &lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;also &lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;other credentials, like &lt;/span&gt;&lt;/span&gt;&lt;a href="https://www.ssh.com/academy/ssh-keys"&gt;&lt;span&gt;&lt;span&gt;SSH keys&lt;/span&gt;&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;span&gt;, that serve the same purpose as passwords in the sense that they are access credentials just as well&lt;/span&gt;&lt;span&gt; and, at the same time, are overlooked&lt;/span&gt;&lt;span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Fbest-way-to-manage-ssh-keys-without-key-vaults&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Privileged Access Management</category>
      <category>SSH Keys</category>
      <category>Zero Trust Suite</category>
      <pubDate>Tue, 04 Apr 2023 08:26:45 GMT</pubDate>
      <author>jani.virkkula@ssh.com (Jani Virkkula)</author>
      <guid>https://www.ssh.com/blog/best-way-to-manage-ssh-keys-without-key-vaults</guid>
      <dc:date>2023-04-04T08:26:45Z</dc:date>
    </item>
    <item>
      <title>Credential management needs to evolve beyond password vaulting | SSH</title>
      <link>https://www.ssh.com/blog/better-without-password-vaulting</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/better-without-password-vaulting" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/password-vaulting-01.jpg" alt="password vaults, password vaulting" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;Whether you are a regular Microsoft 365 user or a super admin wielding a lot of IT power, your passwords must be managed. It just makes cybersecurity sense, and it is required by law.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;But what is the best way to manage passwords that are especially powerful access credentials in the hands of administrators, developers, and consultants?&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/better-without-password-vaulting" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/password-vaulting-01.jpg" alt="password vaults, password vaulting" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;Whether you are a regular Microsoft 365 user or a super admin wielding a lot of IT power, your passwords must be managed. It just makes cybersecurity sense, and it is required by law.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;But what is the best way to manage passwords that are especially powerful access credentials in the hands of administrators, developers, and consultants?&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Fbetter-without-password-vaulting&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Privileged Access Management</category>
      <category>Password Vault</category>
      <pubDate>Tue, 04 Apr 2023 06:34:38 GMT</pubDate>
      <author>jani.virkkula@ssh.com (Jani Virkkula)</author>
      <guid>https://www.ssh.com/blog/better-without-password-vaulting</guid>
      <dc:date>2023-04-04T06:34:38Z</dc:date>
    </item>
    <item>
      <title>Why You Need to Re-Think Cybersecurity in Operational Technology | SSH</title>
      <link>https://www.ssh.com/blog/cybersecurity-in-operational-technology-why-you-have-been-thinking-about-it-wrong</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/cybersecurity-in-operational-technology-why-you-have-been-thinking-about-it-wrong" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/cybersecurity-in-ot-01.jpg" alt="OT cybersecurity, operational technology cybersecurity" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-size: 14px;"&gt;&lt;em&gt;NOTE: This article is written by a guest contributor, Antti Kaunonen. Antti is also advising SSH in automation and operational technology cybersecurity topics as a long-term expert in the industry.&lt;/em&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/cybersecurity-in-operational-technology-why-you-have-been-thinking-about-it-wrong" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/cybersecurity-in-ot-01.jpg" alt="OT cybersecurity, operational technology cybersecurity" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-size: 14px;"&gt;&lt;em&gt;NOTE: This article is written by a guest contributor, Antti Kaunonen. Antti is also advising SSH in automation and operational technology cybersecurity topics as a long-term expert in the industry.&lt;/em&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Fcybersecurity-in-operational-technology-why-you-have-been-thinking-about-it-wrong&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Operational Technology</category>
      <category>OT security</category>
      <pubDate>Thu, 30 Mar 2023 06:00:00 GMT</pubDate>
      <guid>https://www.ssh.com/blog/cybersecurity-in-operational-technology-why-you-have-been-thinking-about-it-wrong</guid>
      <dc:date>2023-03-30T06:00:00Z</dc:date>
      <dc:creator>Antti Kaunonen</dc:creator>
    </item>
    <item>
      <title>Seven Ways to Stay Compliant in Secure Business Communications</title>
      <link>https://www.ssh.com/blog/7-ways-to-stay-compliant-in-secure-business-communications</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/7-ways-to-stay-compliant-in-secure-business-communications" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/secure-business-comms-01.jpg" alt="secure business communications" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;&lt;span&gt;Organizations have a duty to protect and secure sensitive information that they have about their customers, partners, and employees. At the same time, they have legitimate reasons to share that information in-house and &lt;/span&gt;&lt;span&gt;within &lt;/span&gt;&lt;span&gt;their extended ecosystem using secure business communications.&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/7-ways-to-stay-compliant-in-secure-business-communications" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/secure-business-comms-01.jpg" alt="secure business communications" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;&lt;span&gt;Organizations have a duty to protect and secure sensitive information that they have about their customers, partners, and employees. At the same time, they have legitimate reasons to share that information in-house and &lt;/span&gt;&lt;span&gt;within &lt;/span&gt;&lt;span&gt;their extended ecosystem using secure business communications.&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2F7-ways-to-stay-compliant-in-secure-business-communications&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>secure communications</category>
      <category>Secure Data Sharing</category>
      <category>Deltagon Suite</category>
      <pubDate>Thu, 23 Feb 2023 11:40:38 GMT</pubDate>
      <author>jani.virkkula@ssh.com (Jani Virkkula)</author>
      <guid>https://www.ssh.com/blog/7-ways-to-stay-compliant-in-secure-business-communications</guid>
      <dc:date>2023-02-23T11:40:38Z</dc:date>
    </item>
    <item>
      <title>Entering the New Era of Cybersecurity</title>
      <link>https://www.ssh.com/blog/entering-the-new-era-of-cybersecurity</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/entering-the-new-era-of-cybersecurity" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/entering-new-era-of-cybersecurity-01.jpg" alt="quantum era, quantum computing era" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span style="font-weight: bold;"&gt;Entering the new era of the cybersecurity landscape, it is more important than ever for businesses and organizations to implement robust &lt;a href="https://www.ssh.com/blog/defensive-cybersecurity-2022"&gt;defensive cybersecurity&lt;/a&gt; measures to protect their critical data and communications. The number of cyber-attacks has risen dramatically in recent years, with criminals receiving state-level support. This puts organizations, including government agencies, critical industries and infrastructure, financial institutions, authorities, health institutions, and individual citizens, at great risk.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/entering-the-new-era-of-cybersecurity" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/entering-new-era-of-cybersecurity-01.jpg" alt="quantum era, quantum computing era" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span style="font-weight: bold;"&gt;Entering the new era of the cybersecurity landscape, it is more important than ever for businesses and organizations to implement robust &lt;a href="https://www.ssh.com/blog/defensive-cybersecurity-2022"&gt;defensive cybersecurity&lt;/a&gt; measures to protect their critical data and communications. The number of cyber-attacks has risen dramatically in recent years, with criminals receiving state-level support. This puts organizations, including government agencies, critical industries and infrastructure, financial institutions, authorities, health institutions, and individual citizens, at great risk.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Fentering-the-new-era-of-cybersecurity&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Post-Quantum Cryptography</category>
      <pubDate>Mon, 30 Jan 2023 15:06:54 GMT</pubDate>
      <author>kai.lummi@ssh.com (Kai Lummi)</author>
      <guid>https://www.ssh.com/blog/entering-the-new-era-of-cybersecurity</guid>
      <dc:date>2023-01-30T15:06:54Z</dc:date>
    </item>
    <item>
      <title>SSH in the World of Post-Quantum Cryptography (PQC)</title>
      <link>https://www.ssh.com/blog/ssh-in-the-world-of-post-quantum-cryptography</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/ssh-in-the-world-of-post-quantum-cryptography" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/ssh-in-pqc-world-02.jpg" alt="post-quantum cryptography, PQC" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;Nowadays, advances in &lt;a href="https://www.ssh.com/academy/cryptography/quantum-computing-resilient-algorithms"&gt;quantum computing&lt;/a&gt; are moving at a neck-breaking pace. Giants in the field have been faithfully executing roadmaps and delivering on milestones laid out several years ago. And while it is hard to predict when the advances will reach their breaking point, the threat to classical, public key cryptography is getting closer.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;In this article, we discuss the practical threats to SSH encryption posed by viable quantum computers, prioritization, and pointers on embarking on a crypto-agility journey.&amp;nbsp;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/ssh-in-the-world-of-post-quantum-cryptography" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/ssh-in-pqc-world-02.jpg" alt="post-quantum cryptography, PQC" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;Nowadays, advances in &lt;a href="https://www.ssh.com/academy/cryptography/quantum-computing-resilient-algorithms"&gt;quantum computing&lt;/a&gt; are moving at a neck-breaking pace. Giants in the field have been faithfully executing roadmaps and delivering on milestones laid out several years ago. And while it is hard to predict when the advances will reach their breaking point, the threat to classical, public key cryptography is getting closer.&amp;nbsp;&amp;nbsp;&amp;nbsp;&lt;/p&gt; 
&lt;p style="font-weight: bold;"&gt;In this article, we discuss the practical threats to SSH encryption posed by viable quantum computers, prioritization, and pointers on embarking on a crypto-agility journey.&amp;nbsp;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Fssh-in-the-world-of-post-quantum-cryptography&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>UKM</category>
      <category>Post-Quantum Cryptography</category>
      <pubDate>Wed, 18 Jan 2023 10:47:04 GMT</pubDate>
      <guid>https://www.ssh.com/blog/ssh-in-the-world-of-post-quantum-cryptography</guid>
      <dc:date>2023-01-18T10:47:04Z</dc:date>
      <dc:creator>Marieta Uitto</dc:creator>
    </item>
    <item>
      <title>When Should You Start Implementing a Quantum-Safe Solution?</title>
      <link>https://www.ssh.com/blog/when-to-implement-a-quantum-safe-solution</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/when-to-implement-a-quantum-safe-solution" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/implementing-quantum-safe-solution-01.jpg" alt="quantum-safe, quantum-safe solutions, post-quantum cryptography" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;strong&gt;The &lt;/strong&gt;&lt;a href="https://www.ssh.com/academy/cryptography/what-is-quantum-safe-cryptography" style="font-weight: bold;"&gt;quantum threat&lt;/a&gt;&lt;strong&gt;&amp;nbsp;is &lt;/strong&gt;&lt;span&gt;&lt;strong&gt;looming, but we are not exactly sure when it will hit, how serious it will be, or how exactly we should be preparing for it. There is still ongoing development of Quantum-Safe Cryptography, so wouldn't it be better to wait until Post-Quantum Cryptography (PQC) algorithms are more developed? &lt;/strong&gt;&lt;/span&gt;&lt;strong&gt;Let's find out.&lt;/strong&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/when-to-implement-a-quantum-safe-solution" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/implementing-quantum-safe-solution-01.jpg" alt="quantum-safe, quantum-safe solutions, post-quantum cryptography" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;strong&gt;The &lt;/strong&gt;&lt;a href="https://www.ssh.com/academy/cryptography/what-is-quantum-safe-cryptography" style="font-weight: bold;"&gt;quantum threat&lt;/a&gt;&lt;strong&gt;&amp;nbsp;is &lt;/strong&gt;&lt;span&gt;&lt;strong&gt;looming, but we are not exactly sure when it will hit, how serious it will be, or how exactly we should be preparing for it. There is still ongoing development of Quantum-Safe Cryptography, so wouldn't it be better to wait until Post-Quantum Cryptography (PQC) algorithms are more developed? &lt;/strong&gt;&lt;/span&gt;&lt;strong&gt;Let's find out.&lt;/strong&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Fwhen-to-implement-a-quantum-safe-solution&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Tectia SSH</category>
      <category>NQX</category>
      <category>Post-Quantum Cryptography</category>
      <pubDate>Tue, 03 Jan 2023 10:15:23 GMT</pubDate>
      <guid>https://www.ssh.com/blog/when-to-implement-a-quantum-safe-solution</guid>
      <dc:date>2023-01-03T10:15:23Z</dc:date>
      <dc:creator>Jussi Rautio</dc:creator>
    </item>
    <item>
      <title>Know Your Vulnerabilities: Key Exchange in Danger</title>
      <link>https://www.ssh.com/blog/key-exchange-in-danger</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/key-exchange-in-danger" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/key_exchange_in_danger-01.jpg" alt="key exchange, public-key cryptosystem, quantum-safe, post-quantum cryptography" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;The &lt;a href="https://www.ssh.com/academy/cryptography/what-is-quantum-safe-cryptography"&gt;quantum threat&lt;/a&gt;&lt;span&gt; is around the corner. You already know that Post-Quantum Cryptography (PQC) is a cost-effective and practical solution. However, modern data communication cryptosystems used in network protocols like SSH and TLS are complicated and typically consist of multiple encryption algorithms working together. Which parts are the most vulnerable and which ones need to be fixed first? Let's find out.&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/key-exchange-in-danger" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/key_exchange_in_danger-01.jpg" alt="key exchange, public-key cryptosystem, quantum-safe, post-quantum cryptography" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;The &lt;a href="https://www.ssh.com/academy/cryptography/what-is-quantum-safe-cryptography"&gt;quantum threat&lt;/a&gt;&lt;span&gt; is around the corner. You already know that Post-Quantum Cryptography (PQC) is a cost-effective and practical solution. However, modern data communication cryptosystems used in network protocols like SSH and TLS are complicated and typically consist of multiple encryption algorithms working together. Which parts are the most vulnerable and which ones need to be fixed first? Let's find out.&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Fkey-exchange-in-danger&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Tectia SSH</category>
      <category>NQX</category>
      <category>Post-Quantum Cryptography</category>
      <pubDate>Wed, 28 Dec 2022 07:26:54 GMT</pubDate>
      <guid>https://www.ssh.com/blog/key-exchange-in-danger</guid>
      <dc:date>2022-12-28T07:26:54Z</dc:date>
      <dc:creator>Jussi Rautio</dc:creator>
    </item>
    <item>
      <title>How Urgent Is It to Get Protected against the Quantum Threat?</title>
      <link>https://www.ssh.com/blog/get-protected-against-the-quantum-threat</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/get-protected-against-the-quantum-threat" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/quantum-threat-timeline-01.jpg" alt="quantum threat, quantum computers, quantum-safe, post-quantum cryptography" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;There’s a lot of talk these days about &lt;a href="https://www.ssh.com/academy/cryptography/what-is-quantum-safe-cryptography"&gt;the quantum threat&lt;/a&gt; and how it will annihilate current encryption algorithms. What is often overlooked is the timeline, or when we can expect quantum computers to start having an impact. Let’s find out.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/get-protected-against-the-quantum-threat" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/quantum-threat-timeline-01.jpg" alt="quantum threat, quantum computers, quantum-safe, post-quantum cryptography" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;There’s a lot of talk these days about &lt;a href="https://www.ssh.com/academy/cryptography/what-is-quantum-safe-cryptography"&gt;the quantum threat&lt;/a&gt; and how it will annihilate current encryption algorithms. What is often overlooked is the timeline, or when we can expect quantum computers to start having an impact. Let’s find out.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Fget-protected-against-the-quantum-threat&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Tectia SSH</category>
      <category>NQX</category>
      <category>Post-Quantum Cryptography</category>
      <pubDate>Mon, 05 Dec 2022 07:30:22 GMT</pubDate>
      <guid>https://www.ssh.com/blog/get-protected-against-the-quantum-threat</guid>
      <dc:date>2022-12-05T07:30:22Z</dc:date>
      <dc:creator>Jussi Rautio</dc:creator>
    </item>
    <item>
      <title>You Don't Need New Fiber Cables to Be Quantum-Safe</title>
      <link>https://www.ssh.com/blog/you-dont-need-new-fiber-cables-to-be-quantum-safe</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/you-dont-need-new-fiber-cables-to-be-quantum-safe" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/quantum-safe-without-fiber-cables-01.jpg" alt="quantum-safe, post-quantum algorithms, PQC" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span style="font-weight: bold;"&gt;You might already know a lot about &lt;/span&gt;&lt;a href="https://www.ssh.com/academy/cryptography/what-is-quantum-safe-cryptography" style="font-weight: bold;"&gt;the quantum threat&lt;/a&gt;&lt;span style="font-weight: bold;"&gt;, or you might just have heard of it. You might know that there are remedies that would make you quantum-safe. However, you might not know that there is a wide variety of alternatives. Which one is the right one for your organization? Let’s find out.&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/you-dont-need-new-fiber-cables-to-be-quantum-safe" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/quantum-safe-without-fiber-cables-01.jpg" alt="quantum-safe, post-quantum algorithms, PQC" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span style="font-weight: bold;"&gt;You might already know a lot about &lt;/span&gt;&lt;a href="https://www.ssh.com/academy/cryptography/what-is-quantum-safe-cryptography" style="font-weight: bold;"&gt;the quantum threat&lt;/a&gt;&lt;span style="font-weight: bold;"&gt;, or you might just have heard of it. You might know that there are remedies that would make you quantum-safe. However, you might not know that there is a wide variety of alternatives. Which one is the right one for your organization? Let’s find out.&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Fyou-dont-need-new-fiber-cables-to-be-quantum-safe&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Tectia SSH</category>
      <category>Post-Quantum Cryptography</category>
      <pubDate>Mon, 28 Nov 2022 07:50:23 GMT</pubDate>
      <guid>https://www.ssh.com/blog/you-dont-need-new-fiber-cables-to-be-quantum-safe</guid>
      <dc:date>2022-11-28T07:50:23Z</dc:date>
      <dc:creator>Jussi Rautio</dc:creator>
    </item>
    <item>
      <title>Why Quantum-Safe Privileged Access Management Matters</title>
      <link>https://www.ssh.com/blog/quantum-safe-privileged-access-management</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/quantum-safe-privileged-access-management" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/Quantum-safe_PAM-01.jpg" alt="privileged access management, PAM, quantum-safe, quantum security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;a href="https://www.ssh.com/blog/hello-quantum-safe-world" style="font-weight: bold;"&gt;Quantum computers already exist and their efficiency is increasing&lt;/a&gt;&lt;span style="font-weight: bold;"&gt;. While they promise great advances for the medical, biotech, and materials industries to name a few, sooner or later, they will also put classical cryptography in danger. &lt;/span&gt;&lt;span&gt;&lt;span style="font-weight: bold;"&gt;Without going into details, the tried-and-true method of adding more bits to the encryption algorithms to make them more secure won’t protect classical encryption from attacks powered by sufficiently efficient quantum computers.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/quantum-safe-privileged-access-management" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/Quantum-safe_PAM-01.jpg" alt="privileged access management, PAM, quantum-safe, quantum security" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;a href="https://www.ssh.com/blog/hello-quantum-safe-world" style="font-weight: bold;"&gt;Quantum computers already exist and their efficiency is increasing&lt;/a&gt;&lt;span style="font-weight: bold;"&gt;. While they promise great advances for the medical, biotech, and materials industries to name a few, sooner or later, they will also put classical cryptography in danger. &lt;/span&gt;&lt;span&gt;&lt;span style="font-weight: bold;"&gt;Without going into details, the tried-and-true method of adding more bits to the encryption algorithms to make them more secure won’t protect classical encryption from attacks powered by sufficiently efficient quantum computers.&lt;/span&gt;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Fquantum-safe-privileged-access-management&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Privileged Access Management</category>
      <category>PrivX</category>
      <category>Post-Quantum Cryptography</category>
      <pubDate>Mon, 21 Nov 2022 08:29:13 GMT</pubDate>
      <author>jani.virkkula@ssh.com (Jani Virkkula)</author>
      <guid>https://www.ssh.com/blog/quantum-safe-privileged-access-management</guid>
      <dc:date>2022-11-21T08:29:13Z</dc:date>
    </item>
    <item>
      <title>How to Make Mainframes Quantum-Safe and Secure?</title>
      <link>https://www.ssh.com/blog/how-to-make-mainframes-quantum-safe-and-secure</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/how-to-make-mainframes-quantum-safe-and-secure" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/mainframes_quantum-safe-01.jpg" alt="mainframe security, quantum security, mainframes, SFTP, quantum-safe" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span style="font-weight: bold;"&gt;Mainframe admins know very well that all data communications should be well-secured. You have likely already converted your unsecure FTP traffic into SFTP with &lt;/span&gt;&lt;a href="https://www.ssh.com/products/mainframe-security-software" style="font-weight: bold;"&gt;SSH Tectia Server for IBM z/OS&lt;/a&gt;&lt;span style="font-weight: bold;"&gt;, or maybe you are considering your options at this point. But now there’s talk about &lt;/span&gt;&lt;a href="https://www.ssh.com/academy/cryptography/what-is-quantum-safe-cryptography" style="font-weight: bold;"&gt;the quantum threat&lt;/a&gt;&lt;span style="font-weight: bold;"&gt; - that quantum computers are going to compromise all current data communications in a few years' time. You start to wonder: how will this impact me and my system? Let’s find out.&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/how-to-make-mainframes-quantum-safe-and-secure" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/mainframes_quantum-safe-01.jpg" alt="mainframe security, quantum security, mainframes, SFTP, quantum-safe" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span style="font-weight: bold;"&gt;Mainframe admins know very well that all data communications should be well-secured. You have likely already converted your unsecure FTP traffic into SFTP with &lt;/span&gt;&lt;a href="https://www.ssh.com/products/mainframe-security-software" style="font-weight: bold;"&gt;SSH Tectia Server for IBM z/OS&lt;/a&gt;&lt;span style="font-weight: bold;"&gt;, or maybe you are considering your options at this point. But now there’s talk about &lt;/span&gt;&lt;a href="https://www.ssh.com/academy/cryptography/what-is-quantum-safe-cryptography" style="font-weight: bold;"&gt;the quantum threat&lt;/a&gt;&lt;span style="font-weight: bold;"&gt; - that quantum computers are going to compromise all current data communications in a few years' time. You start to wonder: how will this impact me and my system? Let’s find out.&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Fhow-to-make-mainframes-quantum-safe-and-secure&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Post-Quantum Cryptography</category>
      <category>mainframe security</category>
      <category>Tectia z/OS</category>
      <pubDate>Fri, 18 Nov 2022 10:45:27 GMT</pubDate>
      <guid>https://www.ssh.com/blog/how-to-make-mainframes-quantum-safe-and-secure</guid>
      <dc:date>2022-11-18T10:45:27Z</dc:date>
      <dc:creator>Jussi Rautio</dc:creator>
    </item>
    <item>
      <title>Hello, Quantum-Safe World!</title>
      <link>https://www.ssh.com/blog/hello-quantum-safe-world</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/hello-quantum-safe-world" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/quantum-safe-world-01.jpg" alt="quantum-safe, quantum-safe world, hello world" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;strong&gt;&lt;span&gt;Quantum computers are no longer science fiction. Their computation power is increasing by leaps and bounds both in terms of the number of usable qubits and optimization in error correction. The recent advances and heavy investment only accelerate the progress.&amp;nbsp;&lt;/span&gt;&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/hello-quantum-safe-world" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/quantum-safe-world-01.jpg" alt="quantum-safe, quantum-safe world, hello world" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;strong&gt;&lt;span&gt;Quantum computers are no longer science fiction. Their computation power is increasing by leaps and bounds both in terms of the number of usable qubits and optimization in error correction. The recent advances and heavy investment only accelerate the progress.&amp;nbsp;&lt;/span&gt;&lt;/strong&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Fhello-quantum-safe-world&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Post-Quantum Cryptography</category>
      <pubDate>Thu, 13 Oct 2022 07:30:06 GMT</pubDate>
      <guid>https://www.ssh.com/blog/hello-quantum-safe-world</guid>
      <dc:date>2022-10-13T07:30:06Z</dc:date>
      <dc:creator>Suvi Lampila</dc:creator>
    </item>
    <item>
      <title>Leila Arstila: My journey to the European Cyber Security Challenge</title>
      <link>https://www.ssh.com/blog/ssh-supports-leila-arstila-at-ecsc-2022</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/ssh-supports-leila-arstila-at-ecsc-2022" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/Leila-Arstila-at-ECSC2022-01.jpg" alt="Leila Arstila: My journey to the European Cyber Security Challenge" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;About Leila&lt;/h2&gt; 
&lt;p&gt;Before I tell you about the journey, let me introduce myself a bit better. My name is Leila “leila” Arstila (I will get back to this rather original nickname later) and I’m a 24-year-old computer science student at Aalto University.&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/ssh-supports-leila-arstila-at-ecsc-2022" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/Leila-Arstila-at-ECSC2022-01.jpg" alt="Leila Arstila: My journey to the European Cyber Security Challenge" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;h2&gt;About Leila&lt;/h2&gt; 
&lt;p&gt;Before I tell you about the journey, let me introduce myself a bit better. My name is Leila “leila” Arstila (I will get back to this rather original nickname later) and I’m a 24-year-old computer science student at Aalto University.&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Fssh-supports-leila-arstila-at-ecsc-2022&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>cybersecurity</category>
      <pubDate>Mon, 10 Oct 2022 09:53:36 GMT</pubDate>
      <guid>https://www.ssh.com/blog/ssh-supports-leila-arstila-at-ecsc-2022</guid>
      <dc:date>2022-10-10T09:53:36Z</dc:date>
      <dc:creator>Guest: Leila Arstila</dc:creator>
    </item>
    <item>
      <title>Are You Using Unauthorized and Non-compliant Channels for Sensitive Information Sharing?</title>
      <link>https://www.ssh.com/blog/using-unauthorized-channels-for-sensitive-information-sharing</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/using-unauthorized-channels-for-sensitive-information-sharing" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/unauthorized-channels-for-SIS-01.jpg" alt="Are You Using Unauthorized and Non-compliant Channels for Sensitive Information Sharing?" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;&lt;span&gt;Are your sensitive communications encrypted, restricted, &lt;/span&gt;&lt;span&gt;trackable, &lt;/span&gt;&lt;span&gt;and compliant? That's the question circulating in the finance sector, as massive fines are hitting financial businesses due to personnel discussing deals and trades on their personal&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;, &lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;unauthorized&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt; devices and&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&amp;nbsp;communication apps&lt;/span&gt;&lt;span&gt; – and then deleting the messages afterward&lt;/span&gt;&lt;span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/using-unauthorized-channels-for-sensitive-information-sharing" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/unauthorized-channels-for-SIS-01.jpg" alt="Are You Using Unauthorized and Non-compliant Channels for Sensitive Information Sharing?" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;&lt;span&gt;Are your sensitive communications encrypted, restricted, &lt;/span&gt;&lt;span&gt;trackable, &lt;/span&gt;&lt;span&gt;and compliant? That's the question circulating in the finance sector, as massive fines are hitting financial businesses due to personnel discussing deals and trades on their personal&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;, &lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;unauthorized&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt; devices and&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&lt;span&gt;&amp;nbsp;communication apps&lt;/span&gt;&lt;span&gt; – and then deleting the messages afterward&lt;/span&gt;&lt;span&gt;.&lt;/span&gt;&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Fusing-unauthorized-channels-for-sensitive-information-sharing&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>secure communications</category>
      <category>Secure Information Sharing</category>
      <category>Deltagon Suite</category>
      <pubDate>Mon, 10 Oct 2022 07:14:42 GMT</pubDate>
      <guid>https://www.ssh.com/blog/using-unauthorized-channels-for-sensitive-information-sharing</guid>
      <dc:date>2022-10-10T07:14:42Z</dc:date>
      <dc:creator>Maarit Asikainen</dc:creator>
    </item>
    <item>
      <title>What Do Privileged Access Management, Bikes &amp; E-bikes Have in Common?</title>
      <link>https://www.ssh.com/blog/experiencing-modern-privileged-access-management</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/experiencing-modern-privileged-access-management" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/modern-PAM-ebikes-01.jpg" alt="What Do Privileged Access Management, Bikes &amp;amp; E-bikes Have in Common?" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;Sometimes you need to experience something firsthand to understand the real difference. I had one of those experiences in the Alps just recently.&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/experiencing-modern-privileged-access-management" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/modern-PAM-ebikes-01.jpg" alt="What Do Privileged Access Management, Bikes &amp;amp; E-bikes Have in Common?" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;Sometimes you need to experience something firsthand to understand the real difference. I had one of those experiences in the Alps just recently.&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Fexperiencing-modern-privileged-access-management&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Privileged Access Management</category>
      <category>PrivX</category>
      <pubDate>Thu, 29 Sep 2022 09:55:29 GMT</pubDate>
      <guid>https://www.ssh.com/blog/experiencing-modern-privileged-access-management</guid>
      <dc:date>2022-09-29T09:55:29Z</dc:date>
      <dc:creator>Teemu Tunkelo</dc:creator>
    </item>
    <item>
      <title>What Does Passwordless, Keyless, and Defensive Cybersecurity Mean?</title>
      <link>https://www.ssh.com/blog/passwordless-keyless-defensive-cybersecurity</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/passwordless-keyless-defensive-cybersecurity" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/passwordless_keyless_defensive_cybersecurity-01.jpg" alt="What Does Passwordless, Keyless, and Defensive Cybersecurity Mean?" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;&lt;span&gt;Imagine a world where you don't need keys to your car or home. Your car lets you in every time you approach it, and the door to your home swings open when you touch the door handle.&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/passwordless-keyless-defensive-cybersecurity" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/passwordless_keyless_defensive_cybersecurity-01.jpg" alt="What Does Passwordless, Keyless, and Defensive Cybersecurity Mean?" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;&lt;span&gt;Imagine a world where you don't need keys to your car or home. Your car lets you in every time you approach it, and the door to your home swings open when you touch the door handle.&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Fpasswordless-keyless-defensive-cybersecurity&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Zero Trust</category>
      <pubDate>Mon, 05 Sep 2022 08:00:00 GMT</pubDate>
      <guid>https://www.ssh.com/blog/passwordless-keyless-defensive-cybersecurity</guid>
      <dc:date>2022-09-05T08:00:00Z</dc:date>
      <dc:creator>Teemu Tunkelo</dc:creator>
    </item>
    <item>
      <title>SSH Overall Leader in KuppingerCole’s Dynamic Access Management Report</title>
      <link>https://www.ssh.com/blog/ssh-named-overall-leader-kuppingercole-dream-leadership-compass</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/ssh-named-overall-leader-kuppingercole-dream-leadership-compass" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/LinkedIn_blog_featured_image_1200x628.jpg" alt="SSH Overall Leader in KuppingerCole’s Dynamic Access Management Report" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;KuppingerCole Analysts just published their &lt;a href="https://info.ssh.com/reports/kuppingercole-dream-2022"&gt;Dynamic Resource Entitlement &amp;amp; Access Management (DREAM)&lt;/a&gt; classification for access management and entitlement platforms that can best operate in dynamic computing environments.&lt;/p&gt; 
&lt;p&gt;This report is first of its kind for the market research company, and it puts special emphasis on platforms that “must operate at the speed of the cloud and grant access based on tasks, toolchains, and workloads rather than roles – or only permission access to static resources such as servers or vaults”, as is stated in the report.&lt;/p&gt; 
&lt;p&gt; &lt;br&gt;&lt;br&gt;We at SSH are happy to announce that &lt;span style="font-weight: bold;"&gt;we are ranked as an 'Overall leader in this document.&lt;/span&gt; We were leaders in the following categories:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;Market Leaders&lt;/li&gt; 
 &lt;li&gt;Market Champions&lt;/li&gt; 
 &lt;li&gt;Product Leaders&lt;/li&gt; 
 &lt;li&gt;Innovation Leaders&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;Download the report &lt;a href="https://info.ssh.com/reports/kuppingercole-dream-2022"&gt;here&lt;/a&gt; for free, courtesy of SSH!&lt;/p&gt; 
&lt;p&gt;&lt;a class="cta_button" href="https://www.ssh.com/cs/ci/?pg=f14ee433-2f4b-4189-8e98-029f2021d59c&amp;amp;pid=470387&amp;amp;ecid=&amp;amp;hseid=&amp;amp;hsic="&gt;&lt;img class="hs-cta-img " style="border-width: 0px; /*hs-extra-styles*/; " alt="Get the Report" src="https://no-cache.hubspot.com/cta/default/470387/f14ee433-2f4b-4189-8e98-029f2021d59c.png"&gt;&lt;/a&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;span&gt;Contents&lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;a href="#what-is-dream"&gt;What Is Dream?&lt;/a&gt;&lt;br&gt;&lt;a href="#vaulting-standing-privileges"&gt;Vaulting, Standing Privileges, and Cloud Workloads Are Not the Optimal Combination&lt;/a&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;a href="#JIT-zero-trust-recognition"&gt;Just-in-Time Zero Trust with Zero Touch Is Gaining Recognition&lt;/a&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;a href="#passwordless-great-encryption-keys"&gt;Passwordless is great - but what about encryption keys?&lt;/a&gt;&lt;br&gt;&lt;a href="#zero-trust-access-management-keys-passwords"&gt;JIT Zero Trust Access Management for Keys and Passwords&lt;/a&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/ssh-named-overall-leader-kuppingercole-dream-leadership-compass" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/LinkedIn_blog_featured_image_1200x628.jpg" alt="SSH Overall Leader in KuppingerCole’s Dynamic Access Management Report" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;KuppingerCole Analysts just published their &lt;a href="https://info.ssh.com/reports/kuppingercole-dream-2022"&gt;Dynamic Resource Entitlement &amp;amp; Access Management (DREAM)&lt;/a&gt; classification for access management and entitlement platforms that can best operate in dynamic computing environments.&lt;/p&gt; 
&lt;p&gt;This report is first of its kind for the market research company, and it puts special emphasis on platforms that “must operate at the speed of the cloud and grant access based on tasks, toolchains, and workloads rather than roles – or only permission access to static resources such as servers or vaults”, as is stated in the report.&lt;/p&gt; 
&lt;p&gt; &lt;br&gt;&lt;br&gt;We at SSH are happy to announce that &lt;span style="font-weight: bold;"&gt;we are ranked as an 'Overall leader in this document.&lt;/span&gt; We were leaders in the following categories:&lt;/p&gt; 
&lt;ul&gt; 
 &lt;li&gt;Market Leaders&lt;/li&gt; 
 &lt;li&gt;Market Champions&lt;/li&gt; 
 &lt;li&gt;Product Leaders&lt;/li&gt; 
 &lt;li&gt;Innovation Leaders&lt;/li&gt; 
&lt;/ul&gt; 
&lt;p&gt;Download the report &lt;a href="https://info.ssh.com/reports/kuppingercole-dream-2022"&gt;here&lt;/a&gt; for free, courtesy of SSH!&lt;/p&gt; 
&lt;p&gt;&lt;a class="cta_button" href="https://www.ssh.com/cs/ci/?pg=f14ee433-2f4b-4189-8e98-029f2021d59c&amp;amp;pid=470387&amp;amp;ecid=&amp;amp;hseid=&amp;amp;hsic="&gt;&lt;img class="hs-cta-img " style="border-width: 0px; /*hs-extra-styles*/; " alt="Get the Report" src="https://no-cache.hubspot.com/cta/default/470387/f14ee433-2f4b-4189-8e98-029f2021d59c.png"&gt;&lt;/a&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;span&gt;Contents&lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;a href="#what-is-dream"&gt;What Is Dream?&lt;/a&gt;&lt;br&gt;&lt;a href="#vaulting-standing-privileges"&gt;Vaulting, Standing Privileges, and Cloud Workloads Are Not the Optimal Combination&lt;/a&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;a href="#JIT-zero-trust-recognition"&gt;Just-in-Time Zero Trust with Zero Touch Is Gaining Recognition&lt;/a&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;a href="#passwordless-great-encryption-keys"&gt;Passwordless is great - but what about encryption keys?&lt;/a&gt;&lt;br&gt;&lt;a href="#zero-trust-access-management-keys-passwords"&gt;JIT Zero Trust Access Management for Keys and Passwords&lt;/a&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Fssh-named-overall-leader-kuppingercole-dream-leadership-compass&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>Privileged Access Management</category>
      <category>PrivX</category>
      <pubDate>Thu, 25 Aug 2022 08:57:37 GMT</pubDate>
      <author>jani.virkkula@ssh.com (Jani Virkkula)</author>
      <guid>https://www.ssh.com/blog/ssh-named-overall-leader-kuppingercole-dream-leadership-compass</guid>
      <dc:date>2022-08-25T08:57:37Z</dc:date>
    </item>
    <item>
      <title>The biggest cyber threat to your organization: Your CISO’s burnout</title>
      <link>https://www.ssh.com/blog/ciso-burnout</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/ciso-burnout" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/CISO_burnout_blog-01.jpg" alt="CISO burnout" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;Cybersecurity experts’ jobs are extremely demanding – they must be on high alert for many hours every day and often around the clock. So, it’s important that their working environment is as stress-free and supportive as possible so that they can do their job properly and have their heads screwed on right in high-pressure situations.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;However, the latest reports show that this is far from reality.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;span&gt;Contents&lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;a href="#working-extreme-hours"&gt;&lt;span&gt;CISOs work extreme hours and experience burnout&lt;/span&gt;&lt;/a&gt;&lt;br&gt;&lt;a href="#remote-work-security"&gt;&lt;span&gt;Lacking remote work security and overload of (manual) tasks&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;a href="#ready-to-quit"&gt;&lt;span&gt;Is your CISO ready to quit?&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;a href="#automation-solutions"&gt;&lt;span&gt;Automation for the rescue&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/ciso-burnout" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/CISO_burnout_blog-01.jpg" alt="CISO burnout" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p&gt;&lt;span&gt;Cybersecurity experts’ jobs are extremely demanding – they must be on high alert for many hours every day and often around the clock. So, it’s important that their working environment is as stress-free and supportive as possible so that they can do their job properly and have their heads screwed on right in high-pressure situations.&lt;/span&gt;&lt;/p&gt; 
&lt;p&gt;&lt;span&gt;However, the latest reports show that this is far from reality.&lt;/span&gt;&lt;span&gt;&amp;nbsp;&lt;/span&gt;&lt;/p&gt; 
&lt;h2&gt;&lt;span&gt;Contents&lt;/span&gt;&lt;/h2&gt; 
&lt;p&gt;&lt;a href="#working-extreme-hours"&gt;&lt;span&gt;CISOs work extreme hours and experience burnout&lt;/span&gt;&lt;/a&gt;&lt;br&gt;&lt;a href="#remote-work-security"&gt;&lt;span&gt;Lacking remote work security and overload of (manual) tasks&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;a href="#ready-to-quit"&gt;&lt;span&gt;Is your CISO ready to quit?&lt;/span&gt;&lt;/a&gt;&lt;span&gt;&lt;br&gt;&lt;/span&gt;&lt;a href="#automation-solutions"&gt;&lt;span&gt;Automation for the rescue&lt;/span&gt;&lt;/a&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Fciso-burnout&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>cybersecurity</category>
      <category>Zero Trust</category>
      <pubDate>Wed, 17 Aug 2022 08:00:00 GMT</pubDate>
      <author>jani.virkkula@ssh.com (Jani Virkkula)</author>
      <guid>https://www.ssh.com/blog/ciso-burnout</guid>
      <dc:date>2022-08-17T08:00:00Z</dc:date>
    </item>
    <item>
      <title>Defensive Cybersecurity and Why It Matters in 2022</title>
      <link>https://www.ssh.com/blog/defensive-cybersecurity-2022</link>
      <description>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/defensive-cybersecurity-2022" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/Defensive_cybersec_2022-01.png" alt="What is defensive cybersecurity &amp;amp; why defensive cybersecurity matters in 2022" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;&lt;span style="color: #444444; background-color: white;"&gt;In recent years, cybersecurity has increasingly emerged alongside traditional risks. For example, buildings, factories, harbors, ships, electricity producers, and distribution and infrastructure networks are increasingly equipped with different types of automation systems and remote-control technologies, making them a potential target for various kinds of cyberattacks.&lt;/span&gt;&lt;/p&gt;</description>
      <content:encoded>&lt;div class="hs-featured-image-wrapper"&gt; 
 &lt;a href="https://www.ssh.com/blog/defensive-cybersecurity-2022" title="" class="hs-featured-image-link"&gt; &lt;img src="https://www.ssh.com/hubfs/Social/Defensive_cybersec_2022-01.png" alt="What is defensive cybersecurity &amp;amp; why defensive cybersecurity matters in 2022" class="hs-featured-image" style="width:auto !important; max-width:50%; float:left; margin:0 15px 15px 0;"&gt; &lt;/a&gt; 
&lt;/div&gt; 
&lt;p style="font-weight: bold;"&gt;&lt;span style="color: #444444; background-color: white;"&gt;In recent years, cybersecurity has increasingly emerged alongside traditional risks. For example, buildings, factories, harbors, ships, electricity producers, and distribution and infrastructure networks are increasingly equipped with different types of automation systems and remote-control technologies, making them a potential target for various kinds of cyberattacks.&lt;/span&gt;&lt;/p&gt;  
&lt;img src="https://track.hubspot.com/__ptq.gif?a=470387&amp;amp;k=14&amp;amp;r=https%3A%2F%2Fwww.ssh.com%2Fblog%2Fdefensive-cybersecurity-2022&amp;amp;bu=https%253A%252F%252Fwww.ssh.com%252Fblog&amp;amp;bvt=rss" alt="" width="1" height="1" style="min-height:1px!important;width:1px!important;border-width:0!important;margin-top:0!important;margin-bottom:0!important;margin-right:0!important;margin-left:0!important;padding-top:0!important;padding-bottom:0!important;padding-right:0!important;padding-left:0!important; "&gt;</content:encoded>
      <category>cybersecurity</category>
      <pubDate>Mon, 08 Aug 2022 08:00:00 GMT</pubDate>
      <guid>https://www.ssh.com/blog/defensive-cybersecurity-2022</guid>
      <dc:date>2022-08-08T08:00:00Z</dc:date>
      <dc:creator>Teemu Tunkelo</dc:creator>
    </item>
  </channel>
</rss>
