SSH, short for Secure Shell, is a remote administration and network protocol; originally designed to replace Telnet and other unsecured protocols such as the Berkeley Remote Shell (rsh). SSH enables secure remote system administration and file transfer over unsecured networks. In this article we will talk about the SSH protocol and its versions, SSH clients
In IT, a Security Operations Center (SOC) or Information Security Operations Center (ISOC) is a centralized location where an organization’s security team monitors, analyzes, detects and solves any security events that might arise. A SOC is usually established to protect sensitive data and comply with industry or government regulations. It involves a very proactive approach
A VPN or Virtual Private Network provides online security, privacy and anonymity. It is an excellent tool for protecting daily digital activities, both business and personal. From something as simple as sending an email to connecting to the dashboard of your company’s cloud environment without it being accessible over the Internet. In this article, we
When migrating to the cloud, security must be taken into consideration from the beginning. By preparing a secure migration to the cloud, you will not only avoid many risks, but also save a lot of time and money. There are many factors to consider when migrating to the cloud, from your company’s current security measures
The Root DNSSEC KSK (Key-signing Key) Ceremony is a strict procedure during which the DNS root zone’s public keying information is signed for the three months following it. The KSK is the key used to sign the set of Zone-signing Keys (ZSK) every three months; being the trust anchor of the Domain Name System (DNS).
Data protection and privacy has become an essential right; due to the leading role of data in our modern economy. It is key both for building trust and for creating added value and, therefore, growth. As a result, data sovereignty measures have been adopted around the world to protect the citizens’ data. Although data management
This year we participate as sponsor in the CISO Day 2020 event that will take place on September 17, in a hybrid format. CISO Day is a yearly cyber security congress, focused on the role of Chief Information Security Officers, organized by CyberSecurity News. This event is targeted to all kinds of cyber security professionals
The OpenVPN clients we recommend at Stackscale are: the open source OpenVPN client for Windows, the open source TunnelBlick solution for Mac OS and, for Linux, an OpenVPN package that can be easily installed. How to install OpenVPN on Linux You can install the OpenVPN client on Linux following one of the following options, depending