Join Us at Oktane 2025! September 24-26 | Caesars Palace, Las Vegas | Booth S6

Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!
INSIGHTS & UPDATES

SecureW2 Blogs

Stay informed with expert insights, best practices, and the latest developments in network security, identity management, and SecureW2 product updates.

How to Setup Microsoft Enterprise PKI

The definition for a Public Key Infrastructures (PKI) varies among cyber security professionals, but is generally considered a collection of components that give everything an organization needs to issue and manage X.509 digital certificates. Cloud PKIs are more versatile and ... Read More

Read More
How to Issue a Certificate from a Microsoft CA Server

Now that we’ve learned passwords are not a secure form of authentication, organizations are implementing digital certificates, which provide stronger security and can be leveraged for more efficient network authentication. Many Microsoft environments use Active Directory Certificate Services (AD CS) ... Read More

Read More
A PKI is the Foundation for Zero Trust Network Security

The IT industry is evolving rapidly, with new technologies, devices, and systems introduced regularly. Organizations are regularly having to update and upgrade their environments regularly to keep up with the modern IT landscape. Organizations today are tasked with managing and ... Read More

Read More
Running PKI-as-a-Service

Creating and operating a certificate-based network is no simple task. Without a highly knowledgeable staff that is well-versed in certificate management, an organization can get bogged down in integration, configuration, and distribution of X.509 digital certificates. Without a centralized system ... Read More

Read More
SolarWinds Compromise

Earlier this month, SolarWinds was breached by (who experts theorize to be) the hacker Russian organization, Cozy Bear. This attack has left 18,000 organizations potentially compromised with 250 of which were confirmed to have data stolen; many were Fortune 500 ... Read More

Read More
Top 3 Pitfalls of Authenticating with OAuth

What is OAuth? Let’s demystify OAuth by starting with a definition. At its core, OAuth provides clients secure access to a server’s resources on behalf of a resource owner. OAuth allows access tokens to be issued to third-party clients by ... Read More

Read More
Maximizing an Internal Windows Certificate Authority

Maintaining a secure network that is easily accessible for users within an organization is more difficult than ever. As cybersecurity technologies improve to address current threats, malicious attackers continue to develop new strategies to circumvent procedures. Many security professionals feel ... Read More

Read More
Managing an Internal Certificate Authority

When considering the failures of credential-based authentication, it’s no surprise that many security-conscious organizations have been upgrading to certificates for authentication. One of the benefits of certificates is the flexibility they provide, including how to acquire certificates, how to distribute ... Read More

Read More
Managed Certificate Authority Services

What is a Certificate Authority? A certificate authority (CA) is an entity that distributes digital certificates. These certificates cryptographically tie an identity to a public key, ensuring that individuals online are who they say they are. Certificate authorities play an ... Read More

Read More
How to Configure Azure AD Attributes on Certificates

Attribute mapping in Azure AD (Microsoft Entra ID) is easier than you might think. With a simple SAML application, you can use customizable Azure attributes to enforce dynamic policy options on your 802.1X network. What are Azure AD (Microsoft Entra ... Read More

Read More
Using Okta to Implement Zero Trust Network Access

Zero Trust is a cybersecurity concept that is being implemented by many security-conscious organizations to combat the external and internal threats they face. At its core, the purpose of Zero Trust is to ensure that each individual in an organization ... Read More

Read More
Can I Use Group Policy Objects with Azure?

As technology continues to migrate to cloud-based networking, many organizations have sought to take advantage of efficient cloud solutions. As a result, Microsoft-based organizations have been transitioning to Azure for their directory services because Active Directory does not work natively ... Read More

Read More