SSH Keys Management - Header Image

A better way to manage SSH Keys

For IT administrators, DevOps leads and developers SSH Keys are a way of life. These little gibberish looking files, placed in esoteric .ssh folders inside your laptop or cloud server is the plumbing that makes all the applications and scripts work together. However, SSH key management is a severe pain for many organizations. A little exercise for you: "Are you affected?" How about a little exercise? Send a quick email to your IT lead/DevOps lead and ask them – how often [...]

Halloween Zombie Eyes

How Halloween inspired me on IT Infrastructure Access Control

Last year while giving candy to some very cute children in my neighborhood I was suddenly reminded of server access security! Bear with me for a bit as I take you on a journey through my random security oriented thoughts. Trick or Treat and Halloween Costumes My family and I usually give candy (the good kind mind you, no tootsie rolls) every year to lots of young children who visit our house in a residential neighborhood here in the Bay Area. [...]

The Agony of Provisioning Users on Cloud-Based Services

The Agony of Provisioning Users on Cloud-Based Services

The Agony of Provisioning Users on Cloud-Based Services In this article, we are going to take a look at the frustrations that businesses may face when provisioning users to cloud-based applications that they use. We will examine the most common difficulties, and how Onion ID can help you to overcome them. Dashboards are often confusing Millions of business users and Internet users experience frustration with online dashboards on a daily basis. Dashboards are often confusing, add to that the hassle of maintaining [...]

Why Anybody Can Steal Your Passwords

You juggle dozens of user names and passwords these days, especially if your business uses multiple cloud services. It's nearly impossible to come up with new passwords, change them regularly, and resist the temptation to use the same password for everything — or write it all down on paper. Data breaches impact companies large and small on a regular basis, and anyone can steal your passwords; it's not all that hard to do. When Malware Ruins Your Day Malware comes in [...]

How Can Businesses Protect Their Teams Data, Passwords And Identities

How Can Businesses Protect Their Teams Data, Passwords And Identities

The job market is changing rapidly and with it, the issue of identity and access management becomes a more and more complex problem for small business. Contractor jobs are the new norm in America, which means employees are coming and going at an ever increasing rate. Finding ways to keep business assets safe, protect devops teams from hanging cloud accounts, and discover new strategies for password management are now top priorities. Both companies and employees alike are seeing the benefit [...]