Ponemon 2014 SSH Security Vulnerability Report

Secure shell (SSH) keys are among the fundamental security controls enterprises rely on to protect data and ensure trust. According to research by the Ponemon Institute, 3 out of 4 enterprises have no security controls in place for SSH which leaves organizations vulnerable to attacks.

Sponsor: Venafi