Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • Enable Secure Wi-Fi with AD CS

    In an age where people have migrated to conducting business online, organizations must ensure their Wi-Fi networks are protected from outside threats. Cyber attacks, including the infamous man-in-the-middle attack, prey on unsecured Wi-Fi networks and farm credentials without admins or ...

    Read More
  • The Risk of Expiring Web Certificates

    Certificate use in a variety of mediums continues to grow, but your certificate provider cannot protect against a common certificate mistake: missing expiration dates. This isn’t a major issue if you’re only using certificates for RADIUS authentication, but it can ...

    Read More
  • How to Issue Sectigo Certificates

    Sectigo, formerly known as Comodo, is a leading provider of digital identity solutions. One of their main products are SSL/TLS certificates and Public Key Infrastructures (PKI), which allows the client to securely share an encryption key with a server so ...

    Read More
  • How to Issue Digicert Certificates to Devices

    Digicert offers a variety of SSL certificates to accommodate any organizational structure and fulfill their specific needs. They supply you with the tools to configure any Platform/OS combination, giving the organization security and visibility benefits all while offering a range ...

    Read More
  • How to Prevent VPN Phishing Attacks

    [vc_row padding_top=”0px” padding_bottom=”0px”][vc_column fade_animation_offset=”45px” width=”1/1″][vc_column_text] What is a Phishing Attack A phishing attack is a type of social engineering attack that is used to steal an unsuspecting user’s data by masquerading as a trusted platform. Oftentimes, the attacker will send ...

    Read More
  • Enabling Double Encryption for Zscaler with SecureW2’s Cloud PKI

    Double encryption adds an extra layer of security to ensure that the connections between the Z App, Connectors, and ZPA ZENs stay protected. Although Zscaler already comes with a layer of TLS encryption, cyber attacks have evolved to the point ...

    Read More
  • Man-in-the-Middle (MITM) Attacks: Explained

    If you’ve ever watched this scene from Spongebob Squarepants, then you have a basic understanding of a man-in-the-middle (MITM) attack. According to UPS Capital, cyber attacks cost small businesses an average of $84,000 to $148,000, and 60% of those attacked ...

    Read More
  • PKI-Supported CMS for Yubikey

    A CMS (Credential Management System) or SCMS (Smart Card Management System) is an invaluable tool for organizations using smart cards and security keys. They have many functions to control credentials for all of your devices in one centralized place. SCMSs ...

    Read More
  • Configuring a PKI for Wi-Fi

    Wi-Fi security and availability is imperative for businesses now that online communication is the standard. Many organizations use passwords to authenticate user devices, but that is no longer a viable option as cyber attacks can easily bypass passwords. This has ...

    Read More
  • How to Automate Certificate Management and Provisioning

    One of the biggest hurdles in certificate management is the lack of experience in finding the proper certificate management solutions. Often, administrators are of the notion that their only option for certificate management is pricey PKIs exclusive for enterprise, that ...

    Read More