Tatu Ylonen (@tjssh) 's Twitter Profile
Tatu Ylonen

@tjssh

Cybersecurity expert. Inventor of SSH - Secure Shell. Artificial intelligence, machine learning, linguistics, knowledge representation. 30+ US patents.

ID: 97249119

linkhttps://ylonen.org calendar_today16-12-2009 17:11:23

825 Tweet

7,7K Followers

4,4K Following

Tatu Ylonen (@tjssh) 's Twitter Profile Photo

I'll be talking with Sam Curry tomorrow in the webinar on the Future of Security. You are welcome to join! Please register at: attendee.gotowebinar.com/register/69146…

Tatu Ylonen (@tjssh) 's Twitter Profile Photo

New ISACA guidance on SSH for the practitioner. SSH keys, encryption, policy, audit. Free download: info.ssh.com/ssh_practition… #infosec #grc

New ISACA guidance on SSH for the practitioner. SSH keys, encryption, policy, audit. Free download:  info.ssh.com/ssh_practition… #infosec #grc
Tatu Ylonen (@tjssh) 's Twitter Profile Photo

New ISACA guidance on SSH (Secure Shell). How to audit&secure SSH keys and access. info.ssh.com/ssh_practition… #infosec #grc #ISACA

New ISACA guidance on SSH (Secure Shell). How to audit&secure SSH keys and access. info.ssh.com/ssh_practition… #infosec #grc #ISACA
Tatu Ylonen (@tjssh) 's Twitter Profile Photo

Oct 25 webinar on SSH keys - should they be managed like access tokens or like certificates? info.ssh.com/ssh_keys_provi… #infosec #grc

Tatu Ylonen (@tjssh) 's Twitter Profile Photo

Webinar today: SSH keys provide access - don't confuse them with certificates. info.ssh.com/ssh_keys_provi… #infosec #grc

Webinar today: SSH keys provide access - don't confuse them with certificates.  info.ssh.com/ssh_keys_provi… #infosec #grc
Tatu Ylonen (@tjssh) 's Twitter Profile Photo

Presenting in 20 minutes (11:00am ET) on BrightTalk on How to Fix Cybersecurity. Welcome to join webinar. brighttalk.com/webcast/288/24…

Tatu Ylonen (@tjssh) 's Twitter Profile Photo

How to audit SSH? Read ISACA joint paper SSH Practitioner considerations. info.ssh.com/ssh_practition… #infosec #grc #isaca

How to audit SSH?  Read ISACA joint paper SSH Practitioner considerations.  info.ssh.com/ssh_practition… #infosec #grc #isaca
Tatu Ylonen (@tjssh) 's Twitter Profile Photo

Understand how to manage SSH. ISACA guidance for the audit/compliance practitioner. info.ssh.com/ssh_practition… #infosec #grc #isaca

Understand how to manage SSH.  ISACA guidance for the audit/compliance practitioner. info.ssh.com/ssh_practition… #infosec #grc #isaca
Tatu Ylonen (@tjssh) 's Twitter Profile Photo

The Intel speculative execution flaw appears serious and multiuser systems (especially public cloud hypervisors) MUST be patched quickly. End user systems and appliances appear largely unaffected (single user). Not remotely exploitable. Performance penalty from fix 5-30% or so.

Tatu Ylonen (@tjssh) 's Twitter Profile Photo

It looks like the Intel attacks seriously affect end user systems as well and are remotely exploitable (Javascript, flash/client-side Java?). Can be injected to any unencrypted HTTP connection on the network or by corrupt server. Browser dependent. Email? spectreattack.com/spectre.pdf

CRN (@crn) 's Twitter Profile Photo

#Intel pledges more fixes against #Spectre And #Meltdown. Here's what you need to know about the latest updates: