Secure Shell key mismanagement poses big risk to your data

Nearly every major network environment today – including governments, large enterprises and financial institutions – uses a version of the Secure Shell data-in-transit protocol, to protect data as it moves throughout the network and allow for administrators to manage systems remotely. Secure Shell works by creating an

Meeting the Revised MAS Technology Risk Management Guidelines

        Dear Partners, Monetary Authority of Singapore (MAS) has released its revised Technology Risk Management (TRM) Guidelines in June 2013. The document presents a set of principles and best practice standards for financial institutions, to establish a sound and robust technology risk management framework,

Nine Questions to Ask When Selecting a Security Vendor

1.Can they thwart bad guys at all phases in the threat lifecycle? Don’t forget that malware and APTs are not the same thing. Your adversaries are engaging in reconnaissance. Then they’re infiltrating your network using malware, stolen passwords, targeted phishing, network vulnerabilities or other methods. Afterward, they’re

Enterprise 2012

Data-Terminator constantly brings the best in class solution to our customer via the best available platform and this year we successfully showcase our Security and Auditing Tools that is non-intrusive to your environment. This includes leading edge solution from Tectia/SSH, Skybox, Accesslayer, Intellinx and More.  

Technology Risk Management Guidelines by Monetary Authority of Singapore

Cost-Effective Controls for Compliance The Technology Risk Management Guidelines, published by the Monetary Authority of Singapore, present best practices for financial institutions to establish a technology risk management framework and to strengthen system security. This white paper will examine the guidelines, highlight particularly significant and challenging requirements

SSH key mismanagement potentially worse in Asia, says founder

Unmanaged Secure Shell (SSH) keys can leave a door open for authorized access by both malicious insiders and external threats, and these can be left undiscovered for years if ever. Over the past decade, very little attention has been paid over to the worsening situation because it