SSH Communications Security announces the release of Tectia version 6.6, The Quantum-Safe Edition. Tectia Quantum-Safe Edition tackles new rising cyber threats and ensures future-proof data security. A related Edition, Tectia Zero Trust, was already implemented in Tectia version 6.5 in March 2022.
Passkeys are like passwords, but better. They’re better because they aren’t created insecurely by humans, and because they use public key cryptography to create much more secure experiences. But passkeys aren’t a new thing. It’s just a new name starting to be used for WebAuthn/FIDO2 credentials that enable fully passwordless experiences.
Current technology advancement not only brings people to get ‘closer’ and borderless in digital world, but it also causes increasing cyber threats to organizations and companies, as well as individual users. Cybercriminals continues to step up their games by using even more sophisticated tools and social engineering techniques that will lure people to fall into their trap.
The IT industry quickly adapted this methodology and OTP became widely used in many organizations and companies. Different OTP standards were developed, which eventually led to OAuth, a standard to standardize types of OTP. This period also saw the emergence of 2FA (Two Factors Authentication) and MFA (Multi Factors Authentication)
SSH launches Tectia Quantum-Safe and Zero-Trust Editions for the Next Wave of Secure Application Communications
SSH announces two new editions of their flagship product Tectia SSH Client/Server: Tectia Quantum-Safe Edition and Tectia Zero Trust Edition. These new additions to the Tectia product family will ensure that SSH’s secure remote access solutions stay agile, dynamic and robust
Quantum computers exist right now: They are in the cloud where anyone can access at a reasonably low cost. The overall increase in cybercrime and the financial capabilities of cybercriminals (currently over 1 trillion p.a. estimated to grow to 10 trillion p.a. by 2025): Especially ransomware attacks.
In today’s fast changing world of cybersecurity technologies, log management is boring. In the 1980s, syslog started as part of the Sendmail project, where log messages can be used for security analysis, system/operational management, debugging and compliance.
There are many things that have changed during the pandemic. New habits are being adopted and people are beginning to embrace the changes. Businesses no longer work the way they used to. Many workplaces now prefer flexible workspaces with shared workstations to reduce office rent cost and encourage hybrid working.
With remote and hybrid working becoming the new norm in organizations, many employees choose to use portable storage devices for their ability to transport data easily and quickly. Portable storage devices such as external hard drives and USBs are also very handy for backing up important documents
Company’s information is increasingly considered as key corporate assets. Customers’ information, financial data, important documents and product blueprints are examples of important and sensitive data that must be guarded from unauthorized access to maintain information security
Technology has made remote working much more feasible and economical compared to on-site working. Although it is not popular until a decade ago, remote working has now become the new norm of how employees work, especially during the pandemic.
Secure Shell (SSH) is still the de facto method for Linux, database & network admins, and application support teams to securely connect to servers and applications within them
From hardware appliances to software solutions and training, DT Asia understands cybersecurity challenges and can deliver solutions that help detect & identify, protect & secure, authenticate & authorise, and degauss & destroy.
#02-72 WCEGA Tower,