How to Issue Sectigo Certificates

Kainoa Lee Uncategorized

How to Issue Sectigo Certificates

Sectigo, formerly known as Comodo, is a leading provider of digital identity solutions. One of their main products are SSL/TLS certificates and Public Key Infrastructures (PKI), which allows the client to securely share an encryption key with a server so …

How to Prevent VPN Phishing Attacks

Eytan Raphaely Uncategorized

How to Prevent VPN Phishing Attacks

What is a Phishing Attack A phishing attack is a type of social engineering attack that is used to steal an unsuspecting user’s data through masquerading as a trusted platform. Oftentimes, the attacker will send an email, instant message, or …

Top 3 Mistakes Setting Up AD CS Certificate Templates

Eytan Raphaely Uncategorized

Top 3 Mistakes Setting Up AD CS Certificate Templates

In order to use certificates for authentication, a security trend caused by the inadequacies of password-based authentication, a public key infrastructure (PKI) must be in place. Active Directory Certificates Services (AD CS) is Microsoft’s on-premise PKI solution and while it …

Creating Private Certificates Authorities for Internal Use

Eytan Raphaely Uncategorized

Creating Private Certificates Authorities for Internal Use

What is a Certificate Authority? A certificate authority (CA) is an entity that distributes digital certificates to devices. These certificates cryptographically tie an identity to a public key, ensuring that individuals online are who they say they are. Certificate authorities …