Matthew McKenna

Subscribe to Matthew McKenna: eMailAlertsEmail Alerts
Get Matthew McKenna via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

Top Stories by Matthew McKenna

Access is everything. It is the fundamental pillar that determines whether critical enterprise assets are safe or exposed. Knowing the answers to the questions of who is accessing what, where they are accessing that information from, why they are accessing that information and, finally, what exactly they're accessing are the basic questions that stand between a breach and brand reputation. Today, access extends well beyond the borders of the enterprise. Global supply chains are increasingly complex. This year at RSA, Josh Douglas, CTO at Raytheon, described the global supply chain as being comprised of shared processes and shared technology that distributes products used in creating, sharing and distributing information. The global supply chain is intertwined intimately and it doesn't seem it will unravel itself anytime soon. Enterprises are encompassed with the cha... (more)

SSH User Keys Now a C-Suite Issue | @CloudExpo #Cloud #BigData #Security

Why SSH User Keys Are Now a C-Suite Issue With so much on their plates, most C-level executives don't have the bandwidth to think about SSH user keys. It would be much simpler to leave such details to the IT department - but that would be a mistake. Why? Because SSH means access - to an organization's servers and data. The creation of SSH user keys is not a controlled process, which means that someone can create credentials without oversight. That fact should be enough to get the C-suite's attention. SSH is a reliable means of providing remote access securely for administrators... (more)

The Blind Spot of the Security Industry | @CloudExpo #Cloud #Security

The Blind Spot of the Security Industry: SSH User Keys More than 95 percent of the world's enterprises rely on SSH user keys to provide administrators and developers an effective means of gaining encrypted access to critical infrastructure: operating systems, applications, payment processing systems, databases, human resource and financial systems, routers, switches, firewalls and other network devices. It is a lifeline of traffic flow within our data centers, our cloud environments and how our third-party vendors and supply chain access our environments. It has done its job quiet... (more)