Blog

Can I Use Google Secure LDAP for Wi-Fi?

LDAP’s importance cannot be denied. As a protocol, it has greatly simplified the directory search process. Unfortunately, as time goes on, LDAP has begun to grow outdated, especially given its association with on-premise hardware and legacy systems. This is why ...

Read More

Why a Managed PKI (MPKI) is Probably Right for You

If you’ve decided to make the move to secure certificate-based authentication, one of the first things you need to figure out is whether you’re going to build your own Public Key Infrastructure (PKI) or use a managed PKI (MPKI). PKIs, ...

Read More

SSL and TLS Explained

Protecting and encrypting communications online is vitally important as there are countless attempts made daily to intercept them for nefarious purposes. From securing a bank transaction to protecting an authentication attempt, people communicate highly sensitive information online and if it’s ...

Read More

Enabling Okta Device Trust for any MDM

In the modern cybersecurity environment, the network perimeter is becoming increasingly blurred and difficult to maintain. Countless workers are remote and require access to resources outside the traditional office environment. This renders the traditional security method of not allowing outsiders ...

Read More

What Is Certificate Management?

When considering the importance of authentication security and establishing device trust to protect your network, it’s no wonder organizations are moving away from credentials in droves. A solution that many are turning to is replacing credentials with certificates for authentication. ...

Read More

Can PKI Replace Passwords?

There is a new trend that’s taking the IT world by storm: Passwordless Authentication. NordPass estimates that the average user has between 70 and 80 passwords. That’s why people so often reuse, share, or choose easy-to-remember passwords. While this may ...

Read More

Combining FIDO2 and PKI: Supporting All Your Applications

The world of IT is constantly evolving. This is true due to both advancements in technology and the emerging remote work landscape of the world. Remote work is now commonplace with 90% of IT leaders seeing an increase in cyberattacks ...

Read More

How to Create a PKI Certificate Authority

What is a Certificate Authority? A certificate authority (CA) is an entity that distributes digital certificates. A digital certificate certifies the ownership of a public key by tying it cryptographically to the subject it is administered to. Certificate authorities are ...

Read More

What is an X.509 Certificate?

The cybersecurity landscape is constantly changing to address new threats, including the methods we use to protect our data and resources. Passwords, still in popular use today, are widely known to be insecure. X.509 certificates are a perfect candidate to ...

Read More

What is a Hardware Security Module?

More than ever, businesses and organizations have a responsibility to secure their data. Highly adaptable organizations have begun to implement a PKI as a means to upgrade network security. According to the 2019 Verizon Data Breach Investigations Report, 29% of ...

Read More