Best Practices

All posts with the Best Practices tag

Discussion
1 month ago

Detecting jailbroken/rooted devices in the workplace

In recent times, my mind has been occupied with a pressing question. Detecting jailbroken/rooted devices. Sure, it sounds pretty simple but here’s the catch—it’s actually not. So, if everyone could chime in on their takes and solutions for detecting jailbroken/rooted devices, I’m sure it would be really helpful in making mobile devices foolproof. 

Discussion
3 months ago

Take on Identity Lifecycle Management!

Hey folks 👋 I was going through a few articles on Identity Lifecycle Management, OneLogin, CyberArk, and even Microsoft’s take. The process is intriguing from user onboarding to deprovisioning, I gotta say, it’s kind of a game-changer. I mean, managing a user’s identity from the moment they join till they exit, automatically provisioning and deprovisioning…

Discussion
5 months ago

How to choose a VPN protocol?

Aloha guys, I’m looking into setting up a VPN for my employes, and I’m trying to figure out which protocol would be the best. I keep seeing OpenVPN, IKEv2/IPSec, and L2TP/IPSec, but I’m not sure which one is actually the most secure and efficient. Also, I’ve been reading about different types of VPNs like Remote…

Discussion
5 months ago

Are all HTTPS connections secure even with SSL/TLS certificates?

Hey everyone, I’ve been trying to understand how SSL/TLS certificates work, and I have a few questions. I get that HTTPS encrypts the connection, but where do SSL and TLS fit into this? Also, I’ve noticed that some websites show a padlock while others don’t, even if they use HTTPS. Does this mean not all…