Subdomain takeover is a vulnerability that has plagued cloud users since the beginning of the cloud. Keytos Researches uncover an easy way to find thousands of new vulnerable domains each month.
One of the most common questions when going passwordless is how do you support legacy systems, While Microsoft supports FIDO2 on premises, the best solution, is to use SmartCard for legacy and FIDO2 for modern authentication.
With the exponential growth of SSL Certificates, it is now impossible to manually manage and discover SSL Certificates. In this blog post we will go over what to look in an SSL monitoring tool to see which one is best for you.
As a security company that secures the most critical workflows for large organizations, we must hold a high security bar for our infrastructure. In this blog we share the Azure best practices we follow.
As more organizations move to cloud-based solutions, the importance of secure and compliant authentication methods has become increasingly critical. While passwordless authentication methods are the pinnacle of security, they have a reputation of being incredibly tedious to set up. Learn how EZSmartCard can help you improve security while removing onboarding friction with FIDO2, Azure CBA, and Passwordless Phone Authentication.
While Remote Desktop Protocol (RDP) is a convenient and efficient way to access remote systems, if it is not properly administered, it can be vulnerable to some attacks such as Man-In-The-Middle attacks caused by using the Trust on First Use (TOFU) model. In this blog post, we will discuss why RDP TOFU is a bad security model and why organizations should use SSL certificates instead.
EZCA enables Azure customers to have a secure and compliant Certificate Authority in Azure that connects to Intune allowing customers to issue device certificates without the need to run an on-premises ADCS Certificate Authority.
Now that organizations are securing their infrastructure by following Zero trust best practices, attackers are moving left in the pipeline and attacking GitHub. Earlier this month, Okta said that its private GitHub repositories were hacked. When the leaders in authentication and Identity Access Management (IAM) are hacked, it’s time to start taking things much more seriously.
With the move to passwordless and App based MFA, It is understandable that your staff might have concerns about installing the Microsoft Authenticator App, In this blog we will walk you through how to deal with this and secure your organization with strong MFA.
With the move to the cloud, the days of manually managing SSL certificates are gone. Now, Most organizations are moving to the ACME protocol. An easy to use protocol that automatically renews your SSL certificates preventing costly outages while freeing your engineers time to focus on other critical tasks.