Zero Trust is an approach to perimeter-less security that helps create an effective environment, policies, and infrastructure to minimize data breaches. Although many enterprises were moving towards the Zero-Trust model, Remote working (Work From Home) accelerated it by ten folds. Remote Work increased demand for a zero trust model, because of its potential to remedy [...] Read More →
What is RADIUS? RADIUS (Remote Authentication Dial-In User Service) is a client-server networking protocol. It runs in the application layer. RADIUS being an AAA protocol that manages network access provides centralized Authentication, Authorization, and Accounting for users who use network services. RADIUS uses two types of packets to manage the AAA process:  Access-Request - this [...] Read More →
An Identity Provider (IDP) is a digital service that creates and manages a user’s digital identity and identity attributes associated with it. IDPs authenticate users to third-party services providers (like websites, web applications, etc.) using these identities. IDP allows users to bring their own identities to their workspace and enables them to sign up/ login [...] Read More →
With the increasing stats of cybercrimes, continuous development of the latest authentication schemes are emerging to tackle the rising cyber threats. Custom Database aka Database as Authentication Source is one such authentication method that's gaining popularity,  thanks to the benefits it offers. Let's take a glance at what's it, How it works, its pros and [...] Read More →
Malware is a catch-all term for any type of malicious software designed to infiltrate or exploit any programmable device, service, or network without the owner's informed consent. Malware can infect computers and devices in several ways and comes in a number of forms, just a few of which include Viruses, Worms, Trojans, OWASP attacks, Brute [...] Read More →