SSH infosecuration
6.6K views | +0 today
Follow
SSH infosecuration
Your new post is loading...
Your new post is loading...
Scooped by SSH Communications Security
Scoop.it!

BlackEnergy cyberespionage group adds disk wiper and SSH backdoor to its arsenal

BlackEnergy cyberespionage group adds disk wiper and SSH backdoor to its arsenal | SSH infosecuration | Scoop.it
A cyberespionage group focused on companies and organizations from the energy sector has recently updated its arsenal with a destructive data-wiping component and a backdoored SSH server.
more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

SSH getting a security tune-up from NIST and IETF - TechRepublic

SSH getting a security tune-up from NIST and IETF - TechRepublic | SSH infosecuration | Scoop.it
NIST and the IETF are working to make SSH even more secure. Meanwhile, there's a Microsoft version lurking.
more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

SSH Communications Security's CryptoAuditor Now Certified VCE Vblock Ready

SSH Communications Security's CryptoAuditor Now Certified VCE Vblock Ready | SSH infosecuration | Scoop.it
HELSINKI and WALTHAM, Mass., Aug. 31, 2015 /PRNewswire/ -- SSH Communications Security today announced that its CryptoAuditor™ solution is now certified as a Vblock Ready solution through the VCE Technology Alliance Partner (TAP) program.
more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

Guardians at the Gate: Securing Third-Party Access to Critical Systems

Guardians at the Gate: Securing Third-Party Access to Critical Systems | SSH infosecuration | Scoop.it

Access is everything. It is the fundamental pillar that determines whether critical enterprise assets are safe or exposed. Knowing the answers to the questions of who is accessing what, where they are accessing that information from, why they are accessing that information and, finally, what exactly they're accessing are the basic questions that stand between a breach and brand reputation.

more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

Microsoft bringing SSH to Windows and PowerShell

Microsoft bringing SSH to Windows and PowerShell | SSH infosecuration | Scoop.it
Will contribute to OpenSSH to make it run well on Windows.
more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

PCI: 5 New Security Requirements

PCI: 5 New Security Requirements | SSH infosecuration | Scoop.it
Five best practices noted in version 3.0 of the PCI Data Security Standard will become requirements after June 30, with remote access and third-party risks the key
more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

Key management is the biggest pain of encryption

Key management is the biggest pain of encryption | SSH infosecuration | Scoop.it
Most IT professionals rate the pain of managing encryption keys as severe, according to a new global survey by the Ponemon Institute
more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

Attacks against industrial control systems double

Attacks against industrial control systems double | SSH infosecuration | Scoop.it
Attacks against industrial control systems doubled last year, according to a new report from Dell. In particular, attacks specifically targeting SCADA industrial control systems rose 100 percent in 2014 compared to the previous year.
more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

Encryption: More and more companies use it, despite nasty tech headaches - ZDNet

Encryption: More and more companies use it, despite nasty tech headaches - ZDNet | SSH infosecuration | Scoop.it
One in three firms now scramble data to protect it from prying eyes - but encryption remains a complicated technology to manage for most.
more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

Group Behind SSH Brute Force Attacks Slowed Down | Threatpost | The first stop for security news

Group Behind SSH Brute Force Attacks Slowed Down | Threatpost | The first stop for security news | SSH infosecuration | Scoop.it
A criminal group whose actions have at times been responsible for one-third of the Internet’s SSH traffic—most of it in the form of SSH brute force attacks—has
more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

Can Your Employees Be Manipulated?

Can Your Employees Be Manipulated? | SSH infosecuration | Scoop.it
As financial institutions update their defenses in light of new types attacks - from scams to network-penetrating cyber-attacks - they need to ensure they factor in all of the ways that their systems and employees might be targeted or manipulated.
more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

New products of the week 03.23.2015

New products of the week 03.23.2015 | SSH infosecuration | Scoop.it
Our roundup of intriguing new products from companies such as Dell and F5 Networks.
SSH Communications Security's insight:
Key features: deliver privileged access management (PAM) and monitoring over sensitive data assets stored in the cloud. The offering enables deployment to Amazon Elastic Compute Cloud as an Amazon Machine Image.
more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

North South East West People & Machines - Privileged Access Management for the Cloud Does Not Have to Be Painful | SSH Communications Security

North South East West People & Machines - Privileged Access Management for the Cloud Does Not Have to Be Painful | SSH Communications Security | SSH infosecuration | Scoop.it
When considering privileged access management challenges organizations face today, you can simply spin around in circles considering all the angles that need to be considered from a privileged user and M2M perspective. There is no doubt, a great infrastructural transformation is ongoing seeing more and more critical business application functions being moved to private, public and hybrid clouds.
more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

SSH White Paper | A Secure Shell Guide for PCI DSS Version 3

SSH White Paper | A Secure Shell Guide for PCI DSS Version 3 | SSH infosecuration | Scoop.it
A Secure Shell Guide for PCI DSS Compliance Version 3.1
Complete Guidance for PCI DSS Audits in Secure Shell Environments

The compliance landscape is changing and becoming more challenging. Laws
and regulations are updated regularly by standards entities, government and state agencies and they’re not letting up any time soon. Risk and Compliance professionals are faced with answering many questions today:

  • What is your state of compliance today?
  • What regulation, standard or law must you adhere to in your every day-to-day business operations?
  • What rapidly changing technology do you have to assess to ensure continuous compliance?
  • What emerging security threats is your company facing today?

You should consider what controls you have implemented, what frameworks you have adopted, and ask yourself “Are we ready for an audit?” Payment Card Industry Data Security Standard (PCI DSS) is a proprietary information security standard for organizations that handle branded credit cards (VISA, MC, AMEX,Discover, JCB). PCI DSS is an actionable framework for developing a robust payment card data security processes. This document will highlight how various PCI DSS requirements are met with SSH Communications Security product offerings.

more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

NSA wants encryption that fends off quantum computing hacks

NSA wants encryption that fends off quantum computing hacks | SSH infosecuration | Scoop.it
The NSA is in the early stages of developing encryption algorithms that protect against quantum computing hacks.
more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

Auditing Access Control for Amazon Web Services EC2 in less than 15 minutes

Auditing Access Control for Amazon Web Services EC2 in less than 15 minutes | SSH infosecuration | Scoop.it
cryptoauditor, AWS, cloud, EC2 security, privileged identity management, privileged access management, cloud security, information security, data loss prevention, compliance, key management
more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

Key rotation alone doesn’t solve our SSH user key problems | SSH Communications Security Blog

Key rotation alone doesn’t solve our SSH user key problems | SSH Communications Security Blog | SSH infosecuration | Scoop.it

Breaches pertaining to SSH user keys are insidious. There are two primary reasons behind this. First, most organizations do not have comprehensive inventories of what trusts are valid for SSH user keys and do not carefully differentiate between those dedicated for interactive usage and those for service accounts. Secondly, most organizations do not engage in a continuous monitoring of key based authentication and lack a clear understanding from what source IP addresses SSH user keys may and should authenticate. Based on this alone it is difficult for organizations to ascertain whether a trust is rogue, and are usually chasing the breach rather than pre-empting it.  

more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

Cybersecurity on the agenda for 80 percent of corporate boards

Cybersecurity on the agenda for 80 percent of corporate boards | SSH infosecuration | Scoop.it
Cybersecurity is a topic of discussion at most board meetings, according to a new survey of 200 corporate directors. The survey revealed that more than 80 percent of board members say that cybersecurity is discussed at most or all board meetings.
more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

Bigger than Heartbleed, 'Venom' security vulnerability threatens most datacenters | ZDNet

Bigger than Heartbleed, 'Venom' security vulnerability threatens most datacenters | ZDNet | SSH infosecuration | Scoop.it
Security researchers say the zero-day flaw affects "millions" of machines in datacenters around the world.
more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

6 Most Dangerous New Attack Techniques in 2015

6 Most Dangerous New Attack Techniques in 2015 | SSH infosecuration | Scoop.it
SANS experts lay out the up-and-coming trends in attack patterns at RSA Conference.
more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

#RSAC: Information Security's Future Depends on a Better Understanding of ... - Infosecurity Magazine

#RSAC: Information Security's Future Depends on a Better Understanding of ... - Infosecurity Magazine | SSH infosecuration | Scoop.it
#RSAC15: Information Security’s Future Depends on a Better Understanding of Privacy. IAPP representatives offer their industry predictions
more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

Encryption adoption slows, but users believe it frees them from breach reporting - CSO Australia

Encryption adoption slows, but users believe it frees them from breach reporting - CSO Australia | SSH infosecuration | Scoop.it
Adoption of data encryption technology is slowing and protecting back-end data more often than cloud applications, according to new research from Thales and the Ponemon Institute that also found many organisations believe encrypting data exempts...
more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

Why CXOs Must Become Better Informed About Cyber-Security

Why CXOs Must Become Better Informed About Cyber-Security | SSH infosecuration | Scoop.it
A data breach can happen at any time, any place, and from sources about which C-level executives may not even dream.
more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

Why Aren't You Using Secure Communications To Manage Your Network?

Why Aren't You Using Secure Communications To Manage Your Network? | SSH infosecuration | Scoop.it
When I first got into the weeds in my career, I started to deal with managing routers and switches. This was back when the world was flat and it was fairly commonplace to do so using telnet. I didn’t know any better at first.
more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

SSH CryptoAuditor Shortlisted for 2015 SCMagazine Best Cloud Security Solution Award

SSH CryptoAuditor Shortlisted for 2015 SCMagazine Best Cloud Security Solution Award | SSH infosecuration | Scoop.it

SSH Communications Security CryptoAuditor shortlisted for 2015 SCMagazine Award for Best Cloud Computing Security Solution.

more...
No comment yet.