User Lookup With Certificate-Based Authentication

Jake Ludin Consumer Protection, Education

User Lookup With Certificate-Based Authentication

Traditionally, the process of authenticating certificates for network access is independent of the user directory. And in a normally-functioning network environment, this is perfectly acceptable. Certificate-based authentication is ironclad and protects the network from unauthorized entry. Only in very rare, …

Complete Guide To Certificate Authorities

Eytan Raphaely Education

Complete Guide To Certificate Authorities

What is a Certificate Authority? A Certificate Authority is the body that handles the certificate management for a PKI. They  assist in validating the identities of different websites, individuals and devices before administering digital certificates to them. In a PKI …

This artilce discusses some of the common questions we receive about PKIs

Public Key Infrastructure: Explained

Jake Ludin Education

Public Key Infrastructure: Explained

To start, let’s answer the question, “What does a PKI stand for”? PKI stands for Public Key Infrastructure, the use of aPKI by an organization demonstrates a dedication to the security of the network and the effectiveness of public key …

Equifax security breach

Equifax’s Story: The Risks of Lax Security

Jake Ludin Case study, Data Breach

Equifax’s Story: The Risks of Lax Security

On July 29th, 2017, Equifax discovered that data was leaking out of the credit bureau’s databases and had been since approximately mid-May of that year. They publicly reported the incident on September 7th, and it quickly became known as one …