Tag: Security

SSH Secure Shell protocol

SSH protocol: usage, versions and implementations

SSH, short for Secure Shell, is a remote administration and network protocol; originally designed to replace Telnet and other unsecured protocols such as the Berkeley Remote Shell (rsh). SSH enables secure remote system administration and file transfer over unsecured networks. In this article we will talk about the SSH protocol and its versions, SSH clients

READ MORE
Security Operations Center

What is a Security Operations Center (SOC)?

In IT, a Security Operations Center (SOC) or Information Security Operations Center (ISOC) is a centralized location where an organization’s security team monitors, analyzes, detects and solves any security events that might arise. A SOC is usually established to protect sensitive data and comply with industry or government regulations. It involves a very proactive approach

READ MORE
secure connection with VPN

What is a VPN, how does it work and what is it used for?

A VPN or Virtual Private Network provides online security, privacy and anonymity. It is an excellent tool for protecting daily digital activities, both business and personal. From something as simple as sending an email to connecting to the dashboard of your company’s cloud environment without it being accessible over the Internet. In this article, we

READ MORE
Plan a secure migration to the cloud

6 key elements for a secure migration to the cloud

When migrating to the cloud, security must be taken into consideration from the beginning. By preparing a secure migration to the cloud, you will not only avoid many risks, but also save a lot of time and money. There are many factors to consider when migrating to the cloud, from your company’s current security measures

READ MORE
Drawing of the ceremony room and safe room of the Root KSK ceremony

Root DNSSEC KSK Ceremony

The Root DNSSEC KSK (Key-signing Key) Ceremony is a strict procedure during which the DNS root zone’s public keying information is signed for the three months following it. The KSK is the key used to sign the set of Zone-signing Keys (ZSK) every three months; being the trust anchor of the Domain Name System (DNS).

READ MORE
Data protection and data sovereignty in the digital economy

Data protection and data sovereignty in the digital economy

Data protection and privacy has become an essential right; due to the leading role of data in our modern economy. It is key both for building trust and for creating added value and, therefore, growth. As a result, data sovereignty measures have been adopted around the world to protect the citizens’ data. Although data management

READ MORE
Stackscale at CISO Day 2020 cyber security event

Stackscale participates in the CISO Day 2020 event

This year we participate as sponsor in the CISO Day 2020 event that will take place on September 17, in a hybrid format. CISO Day is a yearly cyber security congress, focused on the role of Chief Information Security Officers, organized by CyberSecurity News. This event is targeted to all kinds of cyber security professionals

READ MORE
Choosing an OpenVPN client

Which OpenVPN clients to use and how to install them

The OpenVPN clients we recommend at Stackscale are: the open source OpenVPN client for Windows, the open source TunnelBlick solution for Mac OS and, for Linux, an OpenVPN package that can be easily installed.  How to install OpenVPN on Linux You can install the OpenVPN client on Linux following one of the following options, depending

READ MORE

Our expertise

Stackscale’s team is formed by experts who will help you anytime, 24/7.

Your Private Cloud

Grow and scale at your own pace with Stackscale’s dedicated cloud.

Would you like to know more about Stackscale and our services?

Don’t hesitate to contact us for asking any question you have and discovering more about our Private Cloud, infrastructure and Bare Metal! We will be happy to know more about your project and see if we can grow together!