Gone Phishing: Understanding Different Phishing Types and How to Protect Yourself
Phishing attacks have become an epidemic. Approximately 3.4 billion phishing emails are sent worldwide each day, making it the leading ...
Read More Deployment of 802.1X authentication protocols often feels like more of a headache than a help. So why reconsider 802.1X?
Portnox VP R&D, Juda Thitron, explains why 802.1X remains one of the best ways to authenticate devices and how delivering 802.1X as a software-defined cloud service radically simplifies 802.1X deployment without compromising security, making it an accessible solution for enterprises invested in the cloud computing, enterprise mobility, and digital transformation shifts. Published in RCR Wireless.
Read the full article here.
Gain access to all of Portnox's powerful zero trust access control free capabilities for 30 days!