3Key

802.1X and Digital Certificates

Posted on

802.1X is a standard for network access control. It defines how to provide authentication to devices trying to connect to other devices in LAN or wireless LAN. It provides the Extensible Authentication Protocol (EAP), an authentication framework to secure information during the network authentication process. Authentication in 802.1X networks includes 3 parties: supplicant – client […]

3Key

Encrypted DNS – The good, the bad and the ugly.

Posted on

When it comes to digital age, we quickly adopted a wide range of technologies that enable us manage our finances, collaborate with colleges around the world or calling a cab with a touch of our phone.  Using our web browsers we can consume and create content on demand anywhere and anytime. All of this would […]

3Key

Certificates Monitoring and Alerting

Posted on

In the previous post regarding the EJBCA Dashboards and Reporting we have shown how easily you can setup monitoring for your certification authorities and create visualizations based on that. Now we will go further and create a tool for monitoring and alerting of certificate attributes. In our example below we will focus on monitoring certificate […]

3Key

SignServer Dashboards and Reporting

Posted on

Our post regarding EJBCA Dashboard and Reporting has a really great feedback, people are discussing with us how to make efficient visualisations to be able to read important information on the fly, or how it can be adjusted to provide monitoring capabilities. There are many more possibilities how to use it to support your business […]

3Key

EJBCA Dashboards and Reporting

Posted on

EJBCA is one of the best software to manage your public key infrastructure. Because it is open source and is flexible, you can create basically any use case you need. Yet it lacks a few features, such as reporting and visualisation of data, in order to promptly see the overview and status of activities. Some […]

3Key

Application cryptography under control!

Posted on

it is a usual situation when something bad happens. Who is responsible for the issue related to cryptographic functions of the application? Question which we are not able to answer and often we see arguing between different teams like developers, testers, and operation. Instead of this we need to behave as one environment, one team, […]

Key Management

Importance of Key Attributes

Posted on

Key management is important topic when it comes to protection of critical assets at rest, or during transfer. However, it is very often omitted and we are exposing sensitive data to potential attackers. The reason is probably lack of experience and knowledge in the field of cryptography which is tightly connected with that. We are […]