Governance & Risk Management , Identity Governance & Administration

How to Protect SSH Keys

Mike Dodson of Venafi Outlines Four Steps
Mike Dodson, vice president, ww security strategy & solutions, Venafi

SSH keys are widely used to provide privileged administrative access, but they’re often untracked, unmanaged and unmonitored, says Mike Dodson of Venafi, who outlines an approach for better key protection.

See Also: Visibility Into Distributed Cloud Environments

”SSH is ubiquitous, and for most organizations, it’s not something they purchase,” Dodson says. “Typically, there’s no central owner, so the takeaway message is recognize that SSH is a critical part of your security infrastructure and it needs to be managed with purpose and in a centralized way.”

In a video interview at Information Security Media Group's recent Healthcare Security Summit in New York, Cramer discusses:

  • Defining SSH keys’ role in security;
  • Why some organizations struggle to manage SSH keys;
  • The four steps organizations should take for securing SSH keys.

Dodson is vice president, ww security strategy and solutions, at Venafi. He has 25 years of experience working to bring better security and privacy to enterprise software, consumer products, embedded systems, medical devices and mobile computing.


About the Author

Nick Holland

Nick Holland

Former Director, Banking and Payments

Holland focused on the intersection of digital banking, payments and security technologies. He has spoken at a variety of conferences and events, including Mobile World Congress, Money2020, Next Bank and SXSW, and has been quoted by The Wall Street Journal, CNN Money, MSNBC, NPR, Forbes, Fortune, BusinessWeek, Time Magazine, The Economist and the Financial Times.




Around the Network

Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.