What is Public Key Cryptography?
Public key cryptography, a synonym for asymmetric cryptography, is a clever cryptographic system that allows two parties to exchange encrypted information publicly without worry of interception. Many cryptographic systems are symmetric. Two or more parties share a private key, then ... Read More The post What is Public Key Cryptography? ... Read More
Configuring Yubikey Desktop Login on Jamf-Managed Devices
Yubikeys represent an exciting opportunity to merge two features that are often at odds: security and convenience. Many organizations have purchased Yubikeys and distributed them to their employees for that extra layer of physical security. They’re commonly used to securely ... Read More The post Configuring Yubikey Desktop Login on ... Read More
Public vs Private Certificate Authority
What’s a Certificate Authority (CA)? A certificate authority is an institution that distributes digital certificates. Certificate issuance is a critical part of securing interactions on the internet because certificates cryptographically tie an identity to a public key. Certificates are commonly ... Read More The post Public vs Private Certificate Authority ... Read More
Unlock the Potential of Security Keys
Security keys, also called hardware security keys, are a method of authentication that offers an additional layer of hardened security. They can be used to login to desktops, Wi-Fi, and be integrated into the sign-in process of many popular websites ... Read More The post Unlock the Potential of Security ... Read More
