What is a Certificate Authority? A Certificate Authority is the body that handles the certificate management for a PKI. They assist in validating the identities of different websites, individuals and devices before administering digital certificates to them. In a PKI …
3 Security Advantages of a Cloud RADIUS Server
3 Security Advantages of a Cloud RADIUS Server
April 10, 2020In order to successfully configure a WPA2-Enterprise network you must have a RADIUS server. The RADIUS authorizes and authenticates users signing into the network and eliminates any speculation into who is using your network. A properly configured Cloud RADIUS can …
How To Address America’s Ransomware Threats
How To Address America’s Ransomware Threats
March 16, 2020Over the course of the 2010s, ransomware attacks on city and state governments have increased in number and effectiveness. The lack of proper cybersecurity measures has highlighted a weakness in the US’s preparedness and ability to protect government data. The …
Combating Burnout in Cybersecurity
Combating Burnout in Cybersecurity
Cybersecurity professionals are highly sought-after individuals that add an immense amount of value to an organization, but that value can be difficult to pin down in terms of dollars. As a result, they tend to be under-represented within some organizations. …
Best Practices For IoT Security
Best Practices For IoT Security
February 6, 2020The explosion of Internet of Things devices (IoT) onto the technology market has revolutionized how businesses operate. The endless possible applications of these incredibly diverse devices has led to a surge in quantity over the last 5 years that is …
EAP-TLS vs. PEAP-MSCHAPv2: Which Authentication Protocol is Superior?
EAP-TLS vs. PEAP-MSCHAPv2: Which Authentication Protocol is Superior?
January 31, 2020Ensuring network users are able to securely authenticate to the wireless network is paramount to the overall safety and security of your organization. The most widely used wireless network protocols today are the Extensible Authentication Protocols (EAP) used in WPA2-Enterprise. …
Reduce the Risks of a Certificate Authority
Reduce the Risks of a Certificate Authority
January 22, 2020Recently, cybercriminals have begun targeting public Certificate Authorities (CA) to obtain legitimate certificates and then sell them on the black market. Because these are verified and signed certificates obtained by unjust means, it can be exceedingly difficult to identify them. …
Configuring Yubikey Desktop Login on Jamf-Managed Devices
Configuring Yubikey Desktop Login on Jamf-Managed Devices
November 4, 2019Yubikeys represent an exciting opportunity to merge two features that are often at odds: security and convenience. Many organizations have purchased Yubikeys and distributed them to their employees for that extra layer of physical security. They’re commonly used to securely …
Effective Cybersecurity Starts With People
Effective Cybersecurity Starts With People
September 30, 2019Large banking institutions like Capital One are among the most targeted organizations by cyber-criminals looking to profit through data theft. Banks are responsible for protecting heaps of personal information about their customers, as well as financial wealth and transactions. This …
How To Trust Your Cybersecurity
How To Trust Your Cybersecurity
June 27, 2019Cybersecurity is one of the most dynamic and complex industries in the world today. A business that provides cybersecurity software or products is not just competing against other companies; they’re competing against countless peoples’ ingenuity. To protect networks, servers, users, …