Establishing trust through authentication

EAP-TLS vs. PEAP-MSCHAPv2: Which Authentication Protocol is Superior?

Jake Ludin Education

EAP-TLS vs. PEAP-MSCHAPv2: Which Authentication Protocol is Superior?

Ensuring network users are able to securely authenticate to the wireless network is paramount to the overall safety and security of your organization. The most widely used wireless network protocols today are the Extensible Authentication Protocols (EAP) used in WPA2-Enterprise. …

public certificate authority vs. private certificate authority

Reduce the Risks of a Certificate Authority

Jake Ludin Security Threats

Reduce the Risks of a Certificate Authority

Recently, cybercriminals have begun targeting public Certificate Authorities (CA) to obtain legitimate certificates and then sell them on the black market. Because these are verified and signed certificates obtained by unjust means, it can be exceedingly difficult to identify them. …

yubikey jamf login

Configuring Yubikey Desktop Login on Jamf-Managed Devices

Patrick Grubbs Consumer Protection

Configuring Yubikey Desktop Login on Jamf-Managed Devices

Yubikeys represent an exciting opportunity to merge two features that are often at odds: security and convenience. Many organizations have purchased Yubikeys and distributed them to their employees for that extra layer of physical security. They’re commonly used to securely …

Effective Cybersecurity Starts With People

Jake Ludin Case study, Data Breach

Effective Cybersecurity Starts With People

Large banking institutions like Capital One are among the most targeted organizations by cyber-criminals looking to profit through data theft. Banks are responsible for protecting heaps of personal information about their customers, as well as financial wealth and transactions. This …