Acquisition Blog Post

Posted by Aren Sandersen on Dec 15, 2023 12:00:00 AM

When I founded Foxpass eight years ago, my goal was to bring enterprise-level security features to companies of all sizes. With your help, it's a goal we've been able to achieve. With our product line of identity and access control products for networks and servers, we've improved the security for hundreds of customers.

Read More

RADIUS Server (RADIUS Authentication) and How it Works

Posted by Monika Bhatt on Aug 16, 2023 11:28:00 AM

Remote Authentication Dial-In User Service (RADIUS) is a client-server networking protocol that runs in the application layer. The RADIUS protocol uses a RADIUS Server and RADIUS Clients.

Read More

LDAP: High-scale LDAP with Partitioning

Posted by Karthik Gooli on Jan 5, 2023 9:02:06 PM

 

Read More

Authenticating by Device vs. by User

Posted by Julie Villanueva on Nov 8, 2021 5:41:50 AM

Thought about upping the ante on your security protocols? Control employee access through the identity of the user’s device rather than just the identity of the user.

Read More

Worst Security Breaches of 2021 So Far

Posted by Julie Villanueva on Sep 1, 2021 9:26:39 PM

In 2021, the world saw a rise in security breaches on a national and global scale. Data leaks and compromised systems resulted in data and revenue losses and put millions of users at risk.

The possible cause of these events: Working from home. Covid-19 pushed nearly 42 percent of the U.S. labor force to work from home full-time.  Consequentially, working from home lacks the robust security infrastructure an in-office environment provides. Because of this, many hackers found an opening to attack through in-home offices, as there were more chances of human error and weak cybersecurity systems.

Now in 2021,  breaches are only continuing to grow.  In Sonic-wall’s mid-year update, there were over 2.5 billion malware attacks and 304.7 million ransomware attacks in the first half of 2021 alone. Incidents like these may continue to increase until the end of the year, and it’s best to learn from the major events to prevent them from happening to you.

Let’s dive right in: 

Read More

Security Tools for Managing a Team of Contract Engineers

Posted by Julie Villanueva on Aug 6, 2021 4:14:13 AM

Contract engineering teams consist of workers who only work for a short while. In a situation where you are cycling in and out numerous employees during a season, there may be a potential for breaches and malware.

Contractors coming in from everywhere and going anywhere have access to highly valuable information and systems. This leaves your company vulnerable to a breach during their employment and even after they leave.

For example, in 2017, an ex-employee of Tesla hacked the company's confidential and trade secret information, transferring the data to third parties by placing software on the computer system that would continue to run even when the employee left the company.

Read More

Upgrade your security.

Click Here to learn how Foxpass can help you avoid costly security mistakes

Subscribe Here

Recent Posts

Categories