enterprise
How to Choose a Managed Cloud PKI
As cloud technology and reliability continue to surpass their on-premise counterparts, more than 50% of organizations have made the switch to managed cloud PKI or plan to soon. If your organization isn’t ...
YubiKey PIN/PUK Configuration at Scale
Yubikeys are an all-in-one MFA device. In addition to serving as a physical authentication token, they can generate one-time-passwords (OTP) and require users to input a PIN. It’s quite difficult to enable ...
Application Control and Traffic Shaping: key factors to consider
If you’re like me, then you’ve been pretty busy lately coping with the new world in which we find ourselves. Regardless, the team and I have made some interesting observations, which I ...
COVID-19 Pandemic Drives Sharp Uptick in Misinformation, Fake Domains
Half of cybersecurity professionals regard misinformation as a major threat to the enterprise 46% of organizations plan to improve their ability to react to misinformation and fake domains Erosion of trust caused ...
Enterprise Application Access Client (EAA) Vulnerability (CVE-2019-18847)
On October 15, 2019, Tesla discovered, and responsibly disclosed, a vulnerability within Akamai's Enterprise Application Access (EAA) client that allows privilege escalation and remote code execution (RCE) when an attacker is within ...
What is Dynamic RADIUS?
SecureW2 is pleased to announce the invention of a whole new kind of AAA server – Dynamic (Cloud) RADIUS. It will revolutionize the way you authenticate users and enforce policies to create ...
SASE and QoE: What you need to know
Since Gartner introduced the Secure Access Service Edge (SASE) concept last year, we see growing interest about it among our partners and customers across the globe. However, quite a few people are ...
Inline DDoS Mitigation: Could the Massive Amazon AWS Attack Have Been Avoided?
Terabit(s) per second DDoS attacks have not disappeared. Perhaps they were just taking a rest. AWS just reported a 2.3 Tbps attack earlier this year that tried to knock out cloud services ...
Nexus Repository: A Strategic Guide from Git to Governance
As leaders of organizations, innovators of technology, and practitioners of continuous development, we must understand the constant changes in the industry to better suit the needs of the business and of our ...
What Does the New CVSS 3.1 Scoring Model Mean for Enterprise Security?
With thousands of security vulnerabilities reported each month in products ranging from hardware devices to firmware to popular software apps, how does one prioritise what needs the most attention? From a business ...

