Blog

What Are Virtual Smart Cards?

In the world of authentication cybersecurity, a device growing in popularity is the Smart Card. A smart card, like those produced by Yubico, is a cryptographic tool that allows users to securely authenticate their identity. It can be used for ...

Read More

Using Object Identifiers In PKI Management

Management of a PKI can be a full-time task for an IT team. Ensuring network users are able to authenticate to a secure network, easily maintaining their network identity, providing access to resources they need, and protecting everyone from a ...

Read More

Configuring MFA with AD FS

It’s widely held knowledge that using a single factor for authentication to wireless networks is less than secure and easily exploitable by hackers. Many organizations recognize this and utilize Multi-Factor Authentication (MFA) to provide an extra layer of protection. Each ...

Read More

802.1X EAP-TLS Authentication Flow Explained

For many organizations, the IEEE 802.1X authentication mechanism for Port-Based Network Access Control is the first line of defense against outside attack. It’s also one of the most commonly targeted attack vectors, which makes it a security priority. One of ...

Read More

Tying IP Addresses to Azure Active Directory Users

Effectively tracking and managing identity context is one of the most important aspects of a secure Azure-based network. Without accurate identity context, it’s near impossible to determine if someone is an unauthorized user. Additionally, identity context encompasses SSL inspection, which ...

Read More

Everything You Need to Know About FIDO2

Security Keys are a method of authentication that are becoming increasingly more commonplace due to the additional layer of security they provide. They are a versatile security component that can be used to log in to Wi-Fi, desktops, websites, and ...

Read More

I Have Active Directory, How do I Move to the Cloud?

It’s no secret that organizations are making the transition to cloud-based network environments. This is especially true considering the dramatic increase in remote work due to the global pandemic. Network administrators that use Active Directory (AD) want to be able ...

Read More

What is the Android Trusted Credentials Store?

Similar to Windows and MacOS, Android devices need a system in place in order to determine if a certificate issued by a particular Certificate Authority (CA) is trusted. How does a device decide that a certificate is trusted? When a ...

Read More

MacOS Smart Card Services

Smart Card usage has been on the rise for a variety of different reasons, but undoubtedly the most prominent is for their identity management capabilities. Cybersecurity oriented organizations are taking advantage of smart cards through the use of physical security ...

Read More

Zero Trust Strategy Best Practices With AD CS

Zero trust is a burgeoning security practice among cybersecurity-focused organizations. The main concept behind zero trust is limiting a user’s resources to only what they need access to. For example, a manufacturer implementing zero trust would ensure that their floor ...

Read More