SSH is a de facto standard in securing communications through an encrypted link andelevating privileges, but what happens when SSH is itself not properly secured? Whatvulnerabilities are inherent in the protocol and how do organizations remediate them? Doesthe protection of the keys used by SSH affect the trust placed in this protocol? Despitethe importance of SSH, organizations often neglect to pay attention to best practicesrelated to configuration, especially in the area of adequate controls over SSH keys andkey associations. One way to address this is through the Critical Security Controls.
Sign up for this webcast and be among the first to receive an advance copy of a SANSwhitepaper discussing the vulnerabilities of SSH and how the Critical Security Controlsprovide a roadmap to remediating those flaws.
Please send questions about this webcast to email@example.com.
View the associated whitepaper here.