Blog

What is a Smart Card?

Smart cards, occasionally called chip cards or integrated circuit cards (IC or ICC), are a broad family of physical electronic authentication devices. More practically, they’re physically-secured microprocessors used to control access to resources. From ID cards to security keys, smart ...

Read More

What is Always On VPN?

The rise in remote working has steadily increased with new innovations in technology, but has seen a massive increase since the Covid-19 pandemic. Companies the world over have sent their workers home, however, enabling remote workers to securely access company ...

Read More

AD CS: Migrate from SHA1 to SHA2 (SHA256)

It’s imperative for organizations to fully switch from SHA-1 to SHA-2. The National Institute of Standards and Technology (NIST) stated SHA-1 should not be trusted, PCI Compliance scanners no longer accept SHA-1 certificates, and Google has deprecated the SHA-1 algorithm. ...

Read More

How to Fix the “x509 Certificate Signed by Unknown Authority” Error Code

The use of digital certificates, specifically self-signed certificates, is an ever-increasing shift in prioritizing internal cybersecurity. Self-signed certificates are created, issued, and signed by an organization for use within their organization for operations such as testing, intranets, and S/MIME email ...

Read More

How To Properly Delete a Certificate Authority

Securing communications via digital certificates is among the most secure processes used by organizations today. The use of public key cryptography makes certificates uncrackable and can be used to protect countless network operations. Of course, any network that is not ...

Read More

What is OpenXPKI?

Deploying digital certificates for internal and external use is a growing trend throughout countless industries. Of course, as more people convert to using certificates, they find that using the proper tools to back them up is just as important as ...

Read More

What is a AWS Private CA?

Private certificate authorities (CA), also known as enterprise CAs, are CAs specifically meant for internal use. They are self-hosted and therefore not trusted externally. The usual use cases come from larger organizations or universities that need secure communication for their ...

Read More

802.1X Network Attack Vectors

When used correctly, 802.1X authentication is the gold standard for network security. However, even seasoned IT professionals fail to recognize some key points of attack. If they are left unchecked, they can lead to an 802.1X network vulnerable. In this ...

Read More