Half of organizations do not audit SSH entitlements

Cybercriminals, such as malicious insiders, use SSH keys to access systems from remote locations, evade security tools and escalate privileges, according to a study conducted by Dimensional Research. According to Venafi’s research from October, even though SSH keys provide the highest levels of administrative access they are routinely untracked, unmanaged and poorly secured.

Read full news article on Help Net Security

 


Date:

Categorie(s):

Tag(s):