I enthusiastically use two-factor authentication whenever possible because static passwords aren’t the best mechanism to mitigate risk… Traditional passwords are vulnerable to social engineering, key-loggers,
Author: smaret
Ditigal Identity Security
Security Architect
Owasp Member
Co Founder AppSec Forum - Western Switzerland
OpenSSH hardening for cloud machine – part 1
SSH is often required to access Linux machines that run on the Cloud infrastructure. SSH is perfect to keep confidentiality and integrity of data exchanged between two