Tag: Uncategorized

AES encryption secures modern data across TLS, Wi-Fi, VPNs, and storage systems.
Uncategorized March 3, 2026
What Is AES Encryption? AES-128 vs AES-256 Explained

AES is a NIST-standardized symmetric block cipher used worldwide to protect sensitive data. This guide explains how AES works, compares key sizes, and outlines where it’s used in modern security...

New Integrations: Tenable, Zscaler, and Okta Identity Threat Protection
Uncategorized February 26, 2026
JoinNow 8.3: New Security Integrations, Improved Intelligence Briefs, and more!

JoinNow Platform 8.3 is now available, featuring expanded integrations across a wide range of security platforms—enhancing real-time intelligence capabilities and delivering improvements to Intelligence Briefs. This blog covers all the...

WPA-PSK has a number of vulnerabilities in today’s cybersecurity landscape, issues addressed by newer versions of encryption and login management.
Protocols & Standards Uncategorized February 18, 2026
What is WPA-PSK? How It Works and Better Solutions

WPA-PSK is a method of providing secure access to a Wi-Fi network based on a single, shared password.

Industry veteran Stephen Newhauser, leads new channel program delivers a partner-first framework to drive and scale partner-led revenue.
Uncategorized February 12, 2026
SecureW2 Unveils Global Channel Program to Accelerate Partner Growth

SEATTLE, February 10, 2026 SecureW2, the passwordless security leader, today announced the launch of the Nexus Partner Program, its new global channel program, led by Stephen Newhauser, Senior Director, Worldwide...

Masquerade attacks explained, real-world impact, and how to prevent impersonation
Risks & Threats Uncategorized February 10, 2026
What Is a Masquerade Attack? How Credential Theft Could Cost You Millions

Masquerade attacks use stolen credentials or forged identities to impersonate trusted users or devices. This guide explains how they work, real-world examples, and how to prevent costly damage.

Adaptive Defense: Automate User Deprovisioning & Reassignment
Uncategorized January 6, 2026
JoinNow 8.2: ServiceNow Integration, Improved Adaptive Defense, and more!

JoinNow Platform 8.2 is now available, delivering a stronger foundation for Adaptive Defense by enabling external automation. This release introduces ServiceNow support as a real-time intelligence source, with improvements to...

SecureW2 earns 14 industry awards in 2025 for PKI, Cloud RADIUS, and passwordless security.
Uncategorized December 28, 2025
Best PKI and Cloud RADIUS: SecureW2 Wins 14 Industry Awards in 2025

The SecureW2 JoinNow platform consistently won top awards from cybersecurity experts in 2025. Digital threats are constantly evolving, and that means cybersecurity must keep pace with relentless innovation. SecureW2 remains...

Stop Unauthorized AI Access: Secure Inference Infrastructure with Certificates.
Uncategorized October 16, 2025
Securing AI Inference Infrastructure with Certificate-Based Access

Artificial intelligence has moved beyond research labs. It now drives decisions, powers customer experiences, and automates critical operations across industries. As AI becomes more integrated into business workflows, model inference...

Secure Jamf-managed Macs with YubiKey logins.
Endpoint & Device Management Uncategorized November 4, 2019
Configuring Yubikey Desktop Login on Jamf-Managed Devices

Yubikeys represent an exciting opportunity to merge two features that are often at odds: security and convenience. Many organizations have purchased Yubikeys and distributed them to their employees for that...

Security keys deliver passwordless, phishing-resistant authentication—made stronger with certificate provisioning.
Endpoint & Device Management Uncategorized October 8, 2019
Unlock the Potential of Security Keys

Security keys, also called hardware security keys, are a method of authentication that offers an additional layer of hardened security. They can be used to login to desktops, Wi-Fi, and...

Reduce support burden: streamline device setup with automated onboarding and remote troubleshooting.
BYOD Onboarding Uncategorized October 2, 2019
Buried Under a Mountain of Support Tickets? We Can Help!

Support tickets are an inescapable burden that many IT departments wish they could reduce. Resolving technical issues is a vital function of any IT department, but they amount to a...

Make Wi-Fi onboarding effortless with self-service setup, simple URLs, and certificate-based access
BYOD Onboarding Uncategorized January 4, 2019
Simplifying the Onboarding Process

The most common questions we get in reference to onboarding new users aren’t related to using the software, but rather how to direct users to the software. SecureW2 has developed...