Contact Us

Blog - page 2

image
18 Feb 2022

IoT is Under Attack!

The number of deployed IoT Devices is growing exponentially, and so are the cyber-attacks geared against IoT. The first large scale IoT device attack was Mirai botnet bringing down a large part of the internet. How did the attacker gain control over thousands of IoT devices? It was simply a hard coded credential that gained them access into the device's Operating System.

image
15 Jan 2022

How to Create a Secure Certificate Authority In Azure

We are happy to announce EZCA the PKI built for your cloud scale certificate needs. EZCA will empower your security team to create highly secure and compliant certificate authorities around the world while helping them to prevent costly outages by giving them full visibility into your organizations certificates.

image
08 Oct 2021

AAD Login for Linux Machines is Here!

SSH Keys were designed for a time when SSH was protected by a strong network barrier. With today's zero trust world a stronger password-less identity story is needed. This is why we created the first agent-less AAD based authentication for Linux endpoints.

image
24 Aug 2021

BlackHat Recap

BlackHat 2021 was a great way to catch up with industry experts and talk about the latest security trends. Read our recap to learn more about the latest trends.

image
28 Jul 2021

CloudWatcher is now Open Source!

Following security best practices help reduce the chances of a security breach. However, companies need to be ready to detect and mitigate a breach as soon as it happens. To protect our critical infrastructure we created CloudWatcher and today we are excited to share it with the world for free!