
Top 3 EJBCA Alternatives for Azure
EJBCA alternatives exist! With advancing technology and security concerns at an all-time high, the importance of private certificate authorities (CA) cannot be overlooked. Just a few years back, there were limited choices available for those looking for private CA solutions. But, as the demand increased, the market expanded. Today, the ... Read More

The Top 3 CMS (Credential Management System) Options for Azure and Active Directory
What is a CMS? A credential management system (CMS) is the primary way to manage user credentials. Modern CMS help organizations manage the whole credential lifecycle of the user; from creation, credential resets, to deprovisioning. The primary purpose of a CMS is to enhance security and streamline access management processes ... Read More

What is Certificate Authority Hierarchy and Which CA Hierarchy Should I Use
The World of Certificate Authority Hierarchy The world of CA hierarchy and design is a complex one – but it doesn’t have to be. The implementation of proper certificate authority hierarchy and design is key to secure communication across your organization; before we take a look at the recommended certificate ... Read More

Multifactor Authentication (MFA) Modernization Symposium Reaction – How to Meet the White House’s Cybersecurity Strategy
How to Meet the White House’s Cybersecurity Strategy Last week, the Office of Management and Budget (OMB), the Office of the National Cyber Director (ONCD), the National Security Council (NSC) and the Cybersecurity and Infrastructure Security Agency (CISA) jointly hosted the Multifactor Authentication (MFA) Modernization Symposium in order to discuss ... Read More

Difference Between FIDO2 and Smartcard Authentication
Difference Between FIDO2 and Smartcard Authentication In today’s digital world, secure authentication is more important than ever. With the rise of online threats and cyber-attacks, organizations need to ensure that their systems and data are protected from unauthorized access. To do this, they often use authentication methods such as passwords, ... Read More

PKI and SSL Certificate Management Best Practices
PKI and SSL Certificate Management Best Practices As technology continues to rapidly advance, so too do the corresponding cybersecurity requirements that aim to combat the growing number of ways that data can be breached and companies can be shut down with the click of a mouse. A key pillar of ... Read More

Azure IoT Security Best Practices
Azure IoT Security Best Practices As IoT (Internet of Things) has skyrocketed in mainstream popularity, many businesses find it to be a must-have in order to successfully compete and grow; however, businesses are not the only ones taking note of IoT’s rise in prominence. Hackers have taken advantage of a ... Read More

Unphishable Credentials For Azure and On-Premises Cheaper and More Secure than Password-Based Authentication
Phishing Resistant Credentials For Azure and On-Premises: Cheaper and More Secure than Password-Based Authentication Phishing has increased 47% in the past year; with over 90% of companies reporting being targeted with a phishing attack in the last year, organizations can no longer depend on education and spam filters alone to ... Read More

What Is KB5014754 and Why it Will Cause Your Next Outage
What Is KB5014754 and Why it Will Cause Your Next Outage KB5014754 is a Microsoft security patch that was released June 2022, to remediate CVE-2022-26923 and CVE-2022-26931 which took advantage of the way certificates are matched in active directory by using the account friendly name. Since the $ of computer ... Read More