Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • Phishing-Resistant MFA vs Other Authentication Methods in Azure AD

    On an average day, most employees have to log into numerous different applications and resources at work. The influx of applications necessary for work has led to an exponential increase in login and authentication methods, including things such as one-time ...

    Read More
  • How to Configure Kandji SCEP Profile

    Digital certificates have, time and again, proven to be more secure than credential or password-based authentication as they are phishing-resistant. However, manually distributing digital certificates is a considerable challenge for network administrators in larger organizations. Simple Certificate Enrollment Protocol (SCEP) ...

    Read More
  • Configuring Azure AD CBA with Conditional Access Policies

    Conditional Access Policies, the If-Then statements available in Microsoft Azure AD (Entra ID), enable a much more granular level of access control over the resources managed with Azure AD / Entra ID. It can be used to assess a user’s ...

    Read More
  • A Comprehensive Review of Certificate Pinning: The Challenges and Alternatives

    While digital certificates undoubtedly provide a more secure authentication method than passwords, some organizations still fear the possibility that certificates can be issued to unauthorized parties. Certificate pinning is a security strategy designed to prevent this from occurring by creating ...

    Read More
  • What is Certificate-Based Authentication?

    An IBM study says that stolen or compromised passwords are the most common reason for a data breach. Let’s be honest, usernames and passwords aren’t a good way to prove who you are anymore, especially for large companies. With the ...

    Read More
  • What is TLS Encryption?

    Transport Layer Security is a protocol that ensures privacy and data integrity between two communicating applications. It’s the most widely deployed security protocol used today and is incorporated into web browsers and other applications that require data to be securely ...

    Read More
  • How Does Mutual TLS (MTLS) Authentication Work?

    Mutual TLS, or mTLS, is a trending talk of the town, especially regarding cryptographic encryption in general.  Since you’re here, there’s a good chance you’re concerned about the network at your business’s security and want to look into more robust ...

    Read More
  • What is RSA Asymmetric Encryption? How Does it Work?

    Encryption is the systematic process of converting plain, readable information, or data, into an unreadable format to prevent unauthorized access. This process is achieved by implementing a set of rules known as an encryption algorithm, using an encryption key. This ...

    Read More
  • What is Cryptographic Agility and Why Does it Matter?

    Cryptography is a cornerstone of securing information systems. It involves encoding data to ensure only authorized parties can access it. By converting data into an unreadable format, cryptography protects sensitive data from being exposed in the event of security breaches. ...

    Read More
  • DNS Poisoning Attacks and How to Prevent Them

    As we increasingly rely on the internet for both personal and professional activities, understanding the potential threats to our online security becomes essential. A prevalent and significant risk is DNS Poisoning, a cyber attack that manipulates and exploits vulnerabilities in ...

    Read More