Do. Learn. Teach.

-
Simplifying Secure Access: Enabling Rockwell Automation Remote PLC Access Without a VPN
Read more: Simplifying Secure Access: Enabling Rockwell Automation Remote PLC Access Without a VPNIn this post, we’ll explore the limitations of VPNs and delve into how to enable VPN-less Rockwell Automation remote PLC access.
-
CISA Cyber Scan Water
Read more: CISA Cyber Scan WaterCISA has announced a free (as in beer) service to scan water systems for vulnerabilities. Agilicus has used this scan for a year, receiving weekly reports.
-
Terminator Becomes National Standard
Read more: Terminator Becomes National StandardI’ll be back. Iconic line foreshadows rise of cyber-physical-systems. Terminator trifecta of physical machines, artificial intelligence, cyber-security awry.
-
Split Horizon VPN: Unsafe At Any Speed
Read more: Split Horizon VPN: Unsafe At Any SpeedSplit Horizon VPN’s are used to avoid breaking video conferencing. They are unsafe. See paper for route injection issues.
-
NIST sp 800-63A: Introduce Yourself
Read more: NIST sp 800-63A: Introduce YourselfWho are you? Identity involves knowing who you are, and then later proving it. NIST sp 800-63A enrollment is the first step, let’s talk about that!
-
Bring Your Own Device in Agilicus AnyX
Read more: Bring Your Own Device in Agilicus AnyXWe’ll help you understand the benefits of BYOD and the robust, secure support Agilicus AnyX offers so you are equipped with everything you need to allow it.
-
Auto-Creating Users in Agilicus AnyX
Read more: Auto-Creating Users in Agilicus AnyXAgilicus AnyX allows for auto-creating users that simplifies the process and enhances efficiency. We’ll help you understand the benefits & use cases.
-
Using Groups for Assigning Role-Based Permissions
Read more: Using Groups for Assigning Role-Based PermissionsWe’ll help you understand the benefits of assigning role-based permissions using groups in Agilicus AnyX and the advantages of this approach.
-
Diagnosing User Issues with Audits
Read more: Diagnosing User Issues with AuditsWe’ll help you explore the importance of audits in diagnosing user issues and how using them in Agilicus AnyX empowers admins to resolve problems efficiently.
-
VNC and RDP in Agilicus AnyX: Which is Right for Me?
Read more: VNC and RDP in Agilicus AnyX: Which is Right for Me?You have two different choices for how to enable a Desktop resource for your users: VNC and RDP. We’ll help you determine which one is right for you.
-
The Security Risks of Using VPNs in Water and Wastewater Facilities
Read more: The Security Risks of Using VPNs in Water and Wastewater FacilitiesWhat are the risks of using VPNs in water and wastewater facilities? We’ll help you answer that question and understand what to do instead.
-
The Security Risks of Using Shared Credentials in Water and Wastewater Facilities
Read more: The Security Risks of Using Shared Credentials in Water and Wastewater FacilitiesThere are many security risks of using shared credentials in water and wastewater facilities. Here’s why you should eliminate them and how to do it.
-
Best Practices for Connectors
Read more: Best Practices for ConnectorsYou may have questions about how to install or configure Connectors in Agilicus AnyX. We’ll share best practices so you can decide what works best for you.
-
Best Practices for Multi-Factor Authentication
Read more: Best Practices for Multi-Factor AuthenticationMulti-Factor Authentication is the strongest protection against the common cyber attacks. These best practices will help you implement it in Agilicus AnyX.
-
Give All Users a Unified Single Sign-On Experience
Read more: Give All Users a Unified Single Sign-On ExperienceWhat do we mean when we talk about ‘all users’ or providing a unified experience? And what are the best practices around that? We’ll help you understand both.
-
Zero Trust Troika: The Who, The What, The How
Read more: Zero Trust Troika: The Who, The What, The HowPerimeter security approaches are no longer effective. A Zero Trust Network Architecture is a powerful, modern way to protect your network from cyber attacks.
-
Strengthen Your Industrial Network Cybersecurity with Vendor Access Management
Read more: Strengthen Your Industrial Network Cybersecurity with Vendor Access ManagementSecuring your third-party vendors can help reduce the cyber risk to your control systems and improve overall industrial network cybersecurity.
-
Agilicus Loves Let’s Encrypt™
Read more: Agilicus Loves Let’s Encrypt™Agilicus builds the best Zero Trust technology. It’s built on the best encryption, and the best certificate authority, Let’s Encrypt. Our business would not be possible without their good work.
-
EPA Cybersecurity Recommendations: Unpacking the Impact on Public Water Systems
Read more: EPA Cybersecurity Recommendations: Unpacking the Impact on Public Water SystemsThis article will help you understand the new EPA cybersecurity recommendations, why they matter for public water systems, and the recommended solution.
-
Ready to Strengthen Canada’s Cybersecurity Ecosystem: Agilicus Qualifies to Sell Directly to the Government of Canada
Read more: Ready to Strengthen Canada’s Cybersecurity Ecosystem: Agilicus Qualifies to Sell Directly to the Government of CanadaAgilicus has successfully qualified to sell its innovative Zero Trust solution directly to the Government of Canada. This will help us bolster Canada’s cybersecurity ecosystem and help agencies defend against cyber attacks.
-
Understanding the CISA Zero Trust Maturity Model: A Framework to Improve Your Security Posture
Read more: Understanding the CISA Zero Trust Maturity Model: A Framework to Improve Your Security PostureThis article will give you an overview of the CISA Zero Trust Maturity Model, the changes made in Version 2.0, and how it can benefit your organization.
-
The Zero Trust Roadmap: Understanding NIST 800-207 and How to Align With It
Read more: The Zero Trust Roadmap: Understanding NIST 800-207 and How to Align With ItThis article will give you an overview of NIST 800-207 and the different ways your organization can implement Zero Trust to meet the guidelines.
-
Best Practices In Vendor Privileged Access Management
Read more: Best Practices In Vendor Privileged Access ManagementVendor privileged access management best practices: Access control, strong, unified authentication, fine-audit, secure access.
-
Identity Provider Versus Single-Sign-On
Read more: Identity Provider Versus Single-Sign-OnSingle-Sign-On and Identity Providers are often treated as the same. But, the IdP facilitates the SSO. You can have multiple IdP if desired.
-
Who Are You? Prove It! Identity Versus Authentication
Read more: Who Are You? Prove It! Identity Versus AuthenticationIdentity vs Authentication. Who are you. Prove it. Related but different concepts. Ensure your IdP does not give identity when it realy means authentication.
-
We’re Number 1: Waterloo Region Top In Cybercrime
Read more: We’re Number 1: Waterloo Region Top In CybercrimeWaterloo Region, top in Canada for reported Cybercrime. Why the dubious honour? Better reporting? More targets?
-
GoDaddy Got Got: Multi-Year Breach
Read more: GoDaddy Got Got: Multi-Year BreachA multi-year attack involving 1.2M customers, hosting, DNS. What could the miscreants have achieved? DKIM? SSL? Domain verification?
-
Season’s Greetings from Agilicus – Looking Ahead to 2023 and Beyond
Read more: Season’s Greetings from Agilicus – Looking Ahead to 2023 and BeyondAs we prepare for a holiday season and a promising new year, I want to take a moment to first thank all our customers for the trust they put into Agilicus when it comes to protecting access to their critical resources.
-
Helping Organisations Qualify and Obtain Cyber Insurance – Ridge Canada Cyber Solutions and Agilicus Partner
Read more: Helping Organisations Qualify and Obtain Cyber Insurance – Ridge Canada Cyber Solutions and Agilicus Partner“We are thrilled to partner with Ridge Canada to help SMBs who are scrambling to implement security controls, including multi-factor authentication and privileged access management for their cyber insurance”
-
Another Day, Another Exploit – Protecting Against the ProxyNotShell Exchange Server Zero-Day Vulnerability
Read more: Another Day, Another Exploit – Protecting Against the ProxyNotShell Exchange Server Zero-Day VulnerabilityLearn how zero trust protects against the new Microsoft Exchange Server zero-day exploit affecting Outlook Web Access (OWA), ProxyNotShell. With Agilicus, you’ll block lateral traversal and prevent unauthorised traffic from arriving at your resources while ensuring they are still accessible to legitimate users.