Understanding Mutual TLS (MTLS) Authentication: How It Works
Mutual TLS, or mTLS, is a trending talk of the town, especially regarding cryptographic encryption in general. Since you’re here, there’s a good chance you’re concerned about the network at...
How to Configure 802.1x Printer Authentication?
When organizations establish their IT infrastructure, it’s essential to protect it, including network-connected devices and wired and wireless access points. Printers often fly under the radar among these devices regarding...
How To Prevent Man-in-the-Middle Attacks
Man-in-the-middle attacks (MITM) or on-path attacks are becoming common and complex. Organizations are putting in a lot of effort to mitigate these risks to no avail. Phishing kits are freely...
What is Certificate-Based Authentication?
An IBM study says that stolen or compromised passwords are the most common reason for a data breach. Let’s be honest, usernames and passwords aren’t a good way to prove...
What is Cryptographic Agility and Why Does it Matter?
Cryptography is a cornerstone of securing information systems. It involves encoding data to ensure only authorized parties can access it. By converting data into an unreadable format, cryptography protects sensitive...
Invoking Device Trust with Intune as MDM
Imagine you are a parent working from home, and your child accidentally spills a drink on your work laptop. You have an approaching work deadline, so you finish it on...
What is a PKI (Public Key Infrastructure)?
The use of a Public Key Infrastructure (PKI) by an organization demonstrates a dedication to cybersecurity. It enables passwordless authentication, encrypted communication, and it has been listed by organizations such...
Passwordless Authentication: Explained
Do you want to move to effective Passwordless authentication solutions? Read to find out how a robust passwordless solution can enhance your network's security.
Securely Eliminate MFA with Azure AD CBA
Hackers acquired the personal data of over 37 million T-Mobile users, including names, dates of birth, Social Security numbers, and driver’s license information, in a recent incident that featured a...
Using Certificates for Granular Application Access with Microsoft Defender
The cloud presents an enticing opportunity for businesses – it makes important resources available anywhere, allows them to offshore the cost of storage, and can even save them on hardware...
Implement Microsoft Passwordless Authentication With Azure AD CBA
In this article, we’ll cover precisely what Microsoft Authenticator App is and how you can quickly onboard to digital certificates.
Configure Client Certificate Authentication with OneLogin
Configure Client Certificate Authentication on OneLogin and enforce Zero Trust Policy and make your network secure.
Configure Client Certificate Authentication with Ping
As many organizations shift to the digital mode in the post-pandemic era, there is an exponential increase in cloud-based network solutions. Surprisingly, numerous cutting-edge wireless technologies, such as 5G, virtual...
Automated Certificate Management Environment (ACME) Explained
Want to understand what Automated Certificate Management Environment (ACME) Explained is all about? Read this to know more.
JAMF vs. Kandji: Apple MDMs compared
Read and compare JAMF and Kandji as Apple MDM solutions here.
Portnox CORE vs. Cisco ISE: NAC Comparison
Read about two popular NAC solutions ad pick out the best one for your organizational needs.
Identifying Network Issues with 802.1X
Open SSIDs don't offer the degree of troubleshooting visibility 802.1X does. Here's how 802.1X helps you troubleshoot network issues.
Okta Smartcard Authentication Expanded
Okta is a popular choice for organizations that want top-of-the-line cloud identity management. It’s one of the largest identity providers with a modern cloud directory and a plethora of handy...
YubiKey PIN/PUK Configuration at Scale
Yubikeys are an all-in-one MFA device. In addition to serving as a physical authentication token, they can generate one-time-passwords (OTP) and require users to input a PIN. It’s quite difficult...
What Is RADIUS Redundancy?
In all manner of security, redundancy is strength. It’s a way to ensure that no matter what goes wrong, there is a backup plan in action that can certify safety....
Shared Hosted RADIUS for Managed Service Providers
It’s widely accepted that using a RADIUS server for network authentication is the most secure method, but there’s a significant number of organizations for which RADIUS isn’t feasible. SecureW2 has...
Enabling Windows Machine Certificate Authentication
Looking to use certificate-based authentication on your managed windows devices? Machine authentication with x.509 certificates permits managed Windows machines that don’t belong to any users, to authenticate onto a 802.1X...
Enabling Double Encryption for Zscaler with SecureW2’s PKI
Double encryption adds an extra layer of security to ensure that the connections between the Z App, Connectors, and ZPA ZENs stay protected. Although Zscaler already comes with a layer...
Top 3 Mistakes Setting Up AD CS Certificate Templates
In order to use certificates for authentication, a security trend caused by the inadequacies of password-based authentication, a public key infrastructure (PKI) must be in place. Active Directory Certificates Services...
Passpoint r1 & r2 Compared
Enabling an online connection while users are away from their home networks has been a challenge for those that want a complete and efficient system. The use of mobile data...
Enterprise PKI Management in the Cloud
As the importance of secure authentication continues to rise, many organizations are looking for lightweight, cost-efficient solutions to their cybersecurity concerns. This has caused many to question the efficacy of...
Using VPN for Remote Work? Don’t Make this VPN Security Mistake
We have never been more connected with others than we are today. The workforce is quickly moving to mobile devices. Remote work has picked up dramatically due to the COVID-19...
How To Address America’s Ransomware Threats
Over the course of the 2010s, ransomware attacks on city and state governments have increased in number and effectiveness. The lack of proper cybersecurity measures has highlighted a weakness in...