Secure user authentication is pivotal for network security because there are dozens of cyber attacks that exploit vulnerabilities of unsecured networks. Cyber crimes are more dangerous than ever with the ability to bankrupt a business in as little as 6 …
Root vs Intermediate Certificates and CAs
Root vs Intermediate Certificates and CAs
September 29, 2020One of the main problems in online communication is trust. Let’s say you communicate with your bank through their website: how can you be the bank’s page is real and it’s not a third party imitating the bank’s page and …
LDAP: Explained
LDAP: Explained
August 31, 2020For many years, LDAP has been the dominant protocol for secure user authentication for on-premise directories. Organizations have used LDAP to store and retrieve data from directory services and is a critical part of the blueprint for Active Directory (AD), …
A PKI Solution for Azure
A PKI Solution for Azure
August 25, 2020Cyber crime is a genuine threat now that everyone’s information is uploaded online. It is critical for organizations to keep their users’ information protected from outside threats, otherwise they could be looking at a major catastrophe. Many Azure admins have …
Can I Use Azure with NPS?
Can I Use Azure with NPS?
Many organizations are looking to implement RADIUS servers for their networks because it’s renowned for secure user authentication for Wi-Fi, VPN, and much more. RADIUS is considered an essential part of IT infrastructure for protecting sensitive data on the network. …
How Does Public Key Encryption Work?
How Does Public Key Encryption Work?
July 23, 2020We are living in a time where wireless security is imperative because private data and personal information are uploaded online. As the amount of online data increases, so does the monetary cost of cybercrime. Cyber attacks are incredibly dangerous and …
PKI Delivery Software for Every Device
PKI Delivery Software for Every Device
July 1, 2020While the advantages of certificate-based authentication over credential-based are well documented, many still experience the barrier to entry of provisioning devices with certificates. This is certainly a valid concern for organizations that institute manual configuration policies and neglect to use …
How to Use Yubikeys for VPN
How to Use Yubikeys for VPN
June 22, 2020Yubikeys are a useful and secure tool for protecting yourself from data theft. They add a layer of authentication and can be used with other authentication methods to further protect your data. While Yubikeys are already a powerful multi-factor authentication …
Configuring a PKI for Wi-Fi
Configuring a PKI for Wi-Fi
May 22, 2020Wi-Fi security and availability is imperative for businesses now that online communication is the standard. Many organizations use passwords to authenticate user devices, but that is no longer a viable option as cyber attacks can easily bypass passwords. This has …
Complete Guide To Certificate Authorities
Complete Guide To Certificate Authorities
May 7, 2020What is a Certificate Authority? A Certificate Authority is the body that handles the certificate management for a PKI. They assist in validating the identities of different websites, individuals and devices before administering digital certificates to them. In a PKI …