Matthew McKenna

Subscribe to Matthew McKenna: eMailAlertsEmail Alerts
Get Matthew McKenna via: homepageHomepage mobileMobile rssRSS facebookFacebook twitterTwitter linkedinLinkedIn

Top Stories by Matthew McKenna

The Blind Spot of the Security Industry: SSH User Keys More than 95 percent of the world's enterprises rely on SSH user keys to provide administrators and developers an effective means of gaining encrypted access to critical infrastructure: operating systems, applications, payment processing systems, databases, human resource and financial systems, routers, switches, firewalls and other network devices. It is a lifeline of traffic flow within our data centers, our cloud environments and how our third-party vendors and supply chain access our environments. It has done its job quietly and efficiently over the last two decades. Unfortunately, the access that SSH has been providing, in particular the access SSH user keys provide, has gone largely unmanaged - to an epic degree. There's an unfortunate parallel here to a recent Oscar-winning film based on the events that t... (more)

Guardians at the Gate: Securing Third-Party Access to Critical Systems | @CloudExpo #Cloud

Access is everything. It is the fundamental pillar that determines whether critical enterprise assets are safe or exposed. Knowing the answers to the questions of who is accessing what, where they are accessing that information from, why they are accessing that information and, finally, what exactly they're accessing are the basic questions that stand between a breach and brand reputation. Today, access extends well beyond the borders of the enterprise. Global supply chains are increasingly complex. This year at RSA, Josh Douglas, CTO at Raytheon, described the global supply cha... (more)

SSH User Keys Now a C-Suite Issue | @CloudExpo #Cloud #BigData #Security

Why SSH User Keys Are Now a C-Suite Issue With so much on their plates, most C-level executives don't have the bandwidth to think about SSH user keys. It would be much simpler to leave such details to the IT department - but that would be a mistake. Why? Because SSH means access - to an organization's servers and data. The creation of SSH user keys is not a controlled process, which means that someone can create credentials without oversight. That fact should be enough to get the C-suite's attention. SSH is a reliable means of providing remote access securely for administrators... (more)