SSH infosecuration
Follow
Find
4.8K views | +0 today
 
Scooped by SSH Communications Security
onto SSH infosecuration
Scoop.it!

SSH key mismanagement potentially worse in Asia, says founder - ZDNet

SSH key mismanagement potentially worse in Asia, says founder - ZDNet | SSH infosecuration | Scoop.it
ZDNet SSH key mismanagement potentially worse in Asia, says founder ZDNet Summary: Secure shell key management could be a bigger mess in Asia because cultural barriers in the workplace can lead to less communication, according to CEO and founder of...
more...
No comment yet.
SSH infosecuration
Your new post is loading...
Your new post is loading...
Scooped by SSH Communications Security
Scoop.it!

[Infographic] 4 Steps to Secure Shell Key Management Bliss | New Post from the SSH Blog

[Infographic] 4 Steps to Secure Shell Key Management Bliss | New Post from the SSH Blog | SSH infosecuration | Scoop.it

Secure Shell is an essential component in the day-to-day functions for many IT professionals. In fact, a recent Forrester study found 82% of organizations use Secure Shell and 68% consider Secure Shell important or critical to their business.

While most enterprises use Secure Shell to run and maintain essential business processes, few have ever examined their deployment process of Secure Shell. Secure Shell keys are often created without any oversight or management, and the elevated privileges that accompany Secure Shell keys means there is a higher risk for data breaches and compliance violations.

more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle

The Great SIM Heist: How Spies Stole the Keys to the Encryption Castle | SSH infosecuration | Scoop.it
American and British spies hacked into the internal computer network of the largest manufacturer of SIM cards in the world.
more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

Microsoft Patches Massive Flaw In Active Directory

Microsoft Patches Massive Flaw In Active Directory | SSH infosecuration | Scoop.it
Today, Microsoft has issued a critical patch to every supported version of Windows that resolves a bug that may have been open for as long as fifteen years could allow…
more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

House Takes First Steps on Federal Data Breach Law | Threatpost | The first stop for security news

House Takes First Steps on Federal Data Breach Law | Threatpost | The first stop for security news | SSH infosecuration | Scoop.it
House of Representatives Subcommittee on Commerce, Manufacturing and Trade held preliminary hearings on drafting federal data breach notification legislation
more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

Risk Assessment will be essential in 2015 as threats look to increase | ITProPortal.com

Risk Assessment will be essential in 2015 as threats look to increase | ITProPortal.com | SSH infosecuration | Scoop.it
It has become clear that no business, large or small, is immune from todays emerging threats. Businesses from all walks must wake up to cyber security.
more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

Over 90 percent of data breaches in first half of 2014 were preventable | ZDNet

Over 90 percent of data breaches in first half of 2014 were preventable | ZDNet | SSH infosecuration | Scoop.it
The Online Trust Alliance says that a high percentage of data breaches were the result of staff mistakes -- rather than external hacking.
more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

How secure are your open source-based systems? -- GCN

How secure are your open source-based systems? -- GCN | SSH infosecuration | Scoop.it
Software developers often assume that open source components in their supply chain are reliable – but assumptions like were behind the Heartbleed exploit. Here are ways to lock down your open source projects.
more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

NIST pledges transparency in NSA dealings over crypto standards

NIST pledges transparency in NSA dealings over crypto standards | SSH infosecuration | Scoop.it
The agency says it will disclose all contributions from the National Security Agency
more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

Do politicians understand encryption? – Tech Weekly podcast - The Guardian

Do politicians understand encryption? – Tech Weekly podcast - The Guardian | SSH infosecuration | Scoop.it
Aleks Krotoski and the tech team discuss prime minister David Cameron's proposals for regulation and control of digital encryption technologies
more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

Google publishes third Windows 0-day vulnerability in a month

Google publishes third Windows 0-day vulnerability in a month | SSH infosecuration | Scoop.it
Google is sticking to its 90-day disclosure deadline, despite criticism by Microsoft
more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

Anatomy Of A 'Cyber-Physical' Attack

Anatomy Of A 'Cyber-Physical' Attack | SSH infosecuration | Scoop.it
Inflicting major or physical harm in ICS/SCADA environments takes more than malware.
more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

Internet of Things is a threat to privacy, says FTC

Internet of Things is a threat to privacy, says FTC | SSH infosecuration | Scoop.it
Minimizing the amount of data collected is one way to mitigate risk, suggested FTC Chairwoman Edith Ramirez during a speech at the internet-enabled gadget-engorged Consumer Electronics Show.
more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

Gogo abuses certificate trust to limit access for in-flight Wi-Fi customers

Gogo abuses certificate trust to limit access for in-flight Wi-Fi customers | SSH infosecuration | Scoop.it
After being called out by a Google engineer, Gogo issued a statement admitting that it uses man-in-the-middle attacks to block access to certain websites.
more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

How to Sabotage Encryption Software (And Not Get Caught) | WIRED

How to Sabotage Encryption Software (And Not Get Caught) | WIRED | SSH infosecuration | Scoop.it
When crypto researchers set out to discover the best way to undermine encryption software, they did so believing it would help them eradicate backdoors in the future. Here's what they found.
more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

New Cyber Threat Center May Face Challenges | Threatpost | The first stop for security news

New Cyber Threat Center May Face Challenges | Threatpost | The first stop for security news | SSH infosecuration | Scoop.it
The new cyber threat intelligence integration center will face challenges on information sharing and gathering.
more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

Health Insurer Anthem Didn’t Encrypt Data in Theft

Health Insurer Anthem Didn’t Encrypt Data in Theft | SSH infosecuration | Scoop.it
Anthem stored the Social Security numbers of 80 million customers without encrypting them, the result of what a person familiar with the matter said was a difficult balancing act between protecting the information and making it useful.
more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

A Lot of Security Purchases Remain Shelfware

A Lot of Security Purchases Remain Shelfware | SSH infosecuration | Scoop.it
Companies may be investing more in security, but many are either underutilizing their new purchases or not using them at all, an Osterman Research survey shows.
more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

Growing Open Source Use Heightens Enterprise Security Risks - Dark Reading

Growing Open Source Use Heightens Enterprise Security Risks  - Dark Reading | SSH infosecuration | Scoop.it
Companies often have little clue about the extent of third-party code in the enterprise or the risks it poses, security experts say
more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

Defending encryption doesn’t mean opposing targeted surveillance

Defending encryption doesn’t mean opposing targeted surveillance | SSH infosecuration | Scoop.it
David Omand, the former head of British spy agency GCHQ, has made an extraordinary threat.
more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

NSA Report: How To Defend Against Destructive Malware

NSA Report: How To Defend Against Destructive Malware | SSH infosecuration | Scoop.it
In the wake of the Sony breach, spy agency's Information Assurance Directorate (IAD) arm provides best practices to mitigate damage of data annihilation attacks.
more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

Secret US cybersecurity report: encryption vital to protect private data - The Guardian

Secret US cybersecurity report: encryption vital to protect private data - The Guardian | SSH infosecuration | Scoop.it
Newly uncovered Snowden document contrasts with British PM’s vow to crack down on encrypted messaging after Paris attacks
more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

BYOD will hit an 'inflection point' in 2015: AT&T | ZDNet

BYOD will hit an 'inflection point' in 2015: AT&T | ZDNet | SSH infosecuration | Scoop.it
Security for connected devices could possibly weigh heaviest on telecommunications providers going into 2015.
more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

Will government be an effective cybersecurity leader or passive bystander? - ISACA Now

Will government be an effective cybersecurity leader or passive bystander? - ISACA Now | SSH infosecuration | Scoop.it
more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

DDoS Attacks Slam Finnish Bank

DDoS Attacks Slam Finnish Bank | SSH infosecuration | Scoop.it
Police in Finland are investigating a series of distributed DDoS attacks against the country's OP Pohjola financial services group that have intermittently shut
more...
No comment yet.
Scooped by SSH Communications Security
Scoop.it!

Risks of Uncontrolled Secure Shell - January 2015 NY Information Security Meetup | SSH Communications Security

Risks of Uncontrolled Secure Shell - January 2015 NY Information Security Meetup | SSH Communications Security | SSH infosecuration | Scoop.it

Joe serves as Director of Global Customer Services and is responsible for managing of global technical sales, support, professional services teams and customer projects. He brings over 12 years of experience in information technology, including eight years in the information security technology and network communications industry. He has a strong technical background enabling him to deliver strategic solutions to Fortune 500 customers. As Director of Global Customer Services he manages a global high performance and advanced technical team providing large organizations with solutions that meet their security and regulatory needs.

more...
No comment yet.