SSH Keys Management - Header Image

A better way to manage SSH Keys

For IT administrators, DevOps leads and developers SSH Keys are a way of life. These little gibberish looking files, placed in esoteric .ssh folders inside your laptop or cloud server is the plumbing that makes all the applications and scripts work together. However, SSH key management is a severe pain for many organizations. A little exercise for you: "Are you affected?" How about a little exercise? Send a quick email to your IT lead/DevOps lead and ask them – how often [...]

Halloween Zombie Eyes

How Halloween inspired me on IT Infrastructure Access Control

Last year while giving candy to some very cute children in my neighborhood I was suddenly reminded of server access security! Bear with me for a bit as I take you on a journey through my random security oriented thoughts. Trick or Treat and Halloween Costumes My family and I usually give candy (the good kind mind you, no tootsie rolls) every year to lots of young children who visit our house in a residential neighborhood here in the Bay Area. [...]

How Can Businesses Protect Their Teams Data, Passwords And Identities

How Can Businesses Protect Their Teams Data, Passwords And Identities

The job market is changing rapidly and with it, the issue of identity and access management becomes a more and more complex problem for small business. Contractor jobs are the new norm in America, which means employees are coming and going at an ever increasing rate. Finding ways to keep business assets safe, protect devops teams from hanging cloud accounts, and discover new strategies for password management are now top priorities. Both companies and employees alike are seeing the benefit [...]