Preventing Man-in-the-middle (MITM) Attacks: The Ultimate Guide

Preventing Man-in-the-middle (MITM) Attacks: The Ultimate Guide

A man-in-the-middle (MITM) attack is an incredibly dangerous type of cyber attack that involves a hacker infiltrating a private network by impersonating a rogue access point and acquiring login credentials. According to IBM’s X-Force Threat Intelligence Index, 35% of exploitation ... Read More The post Preventing Man-in-the-middle (MITM) Attacks: The ... Read More
The Best Way to Manage Microsoft Certificates

The Best Way to Manage Microsoft Certificates

Digital certificates are quickly becoming the network security standard for major enterprises because the abilities of certificates far exceed the abilities of passwords. Passwords are an obsolete form of authentication because there are major vulnerabilities in security and user experience. ... Read More The post The Best Way to Manage ... Read More
How to Manage Certificates Using Azure Active Directory (AD)

How to Manage Certificates Using Azure Active Directory (AD)

Many Azure customers run credential-based networks with PEAP-MSCHAPv2 authentication. While that may be fine for some, credential-based authentication has major issues with security and user experience. Passwords are now a bad choice for authentication because modern cyber attacks can easily ... Read More The post How to Manage Certificates Using ... Read More
Active Directory Certificate Services (AD CS): Explained

Active Directory Certificate Services (AD CS): Explained

| | education
There are many components involved in running a certificate-based network. You need to establish trusted servers and certificate authorities (CA), make sure devices can enroll for certificates, authenticate users, manage the certificate life cycle, segment users for different group policies, ... Read More The post Active Directory Certificate Services (AD ... Read More
Moving Away from AD CS: Certificate-Based Authentication with Azure AD & Jamf

Moving Away from AD CS: Certificate-Based Authentication with Azure AD & Jamf

Digital certificates are starting to take over as the preferred method of network authentication because of their proven superiority to passwords in security and user experience. Many organizations are wanting to migrate to the cloud to start implementing certificate-based solutions, ... Read More The post Moving Away from AD CS: ... Read More
Phishing Scams Are Now Capitalizing on Coronavirus

Phishing Scams Are Now Capitalizing on Coronavirus

COVID-19, better known as the Coronavirus, is spreading throughout the world right now and has a lot of people concerned. This has led to scammers incorporating the virus into their phishing attacks to trick people out of their private information ... Read More The post Phishing Scams Are Now Capitalizing ... Read More
Simple Certificate Enrollment Protocol (SCEP): Explained

Simple Certificate Enrollment Protocol (SCEP): Explained

Distributing certificates to managed devices can be a monumental task with a lot of moving parts that need to be accounted for: PKI integration, establishing a gateway, configuration policies, certificate enrollment, device authentication, and much more. Luckily, SCEP provides a ... Read More The post Simple Certificate Enrollment Protocol (SCEP): ... Read More

Update Your Browser to Support TLS 1.2 and WPA2-Enterprise

Organizations should be aware of an important update to TLS. TLS 1.2 is the most recent update that builds on top of TLS 1.0 and TLS 1.1 to increase network security. Updating your browsers and OS to TLS 1.2 is ... Read More The post Update Your Browser to Support ... Read More
Best Practices for AD CS Configuration

Best Practices for AD CS Configuration

Many companies use Windows servers as the main component of their IT infrastructures. If those companies want to use digital certificates for their network, they set up a public key infrastructure (PKI). PKIs deploy and manage certificates, which can be ... Read More The post Best Practices for AD CS ... Read More
certificates credentials

Digital Certificates vs Password Authentication

Businesses understand the importance of passwords for private data security, but might not realize that using a network with passwords poses many security threats. Every advancement in security technology is followed by more sophisticated hacking techniques. Credentials require password change ... Read More The post Digital Certificates vs Password Authentication ... Read More