Top

A Lesson from Sun Tzu: Is Your Cybersecurity Strategy Sound, or Are You Just Making Noise?

September 6, 2017

Ransomware and large-scale DDoS attacks tend to steal the limelight when it comes to cybersecurity. The problem is that,while companies are focused on securing their networks against the latest threat, they tend to overlook a serious underlying flaw that has the potential to cause far greater destruction: SSH keys.

SSH keys are access credentials for the SSH protocol, similar to passwords, prevalent in most Fortune 500 enterprise computing environments.

Read More on Aberdeen Essentials