Ways to Manage Your SSH Keys and Identities
Feb 1,
2017
I wrote a series of blog posts a while ago about SSH authentication using cryptographic keys rather than passwords. I discussed why SSH keys provide easier authentication, how to set up an SSH key agent, and how to maintain multiple websites. There are two areas of security to consider regarding SSH. I think of them […]
authentication,
compliance,
ECC,
Elliptic Curve Cryptography,
HIPAA,
IAM,
Identity and Access Management,
linux,
PCI DSS,
public-key cryptography,
RSA,
Sarbanes-Oxley,
SARBOX,
Security-Enhanced Linux,
SELinux,
SOX,
ssh
The New Android Version Should Help Security
Nov 18,
2013
Google released Android version 4.4 (a.k.a. KitKat) at the end of October. The many changes include some nice security improvements. In Learning Tree’s Cloud Security Essentials course we talk about the need for mobile device security. With Saas (or Software as a Service) offerings, you have no control over what happens with your data on […]