Portnox Blog

Catch up on the latest conversations surrounding network access control, network security, cyber threats, IT security trends and all things Portnox.

byod policies portnox
Evolving Cyber Threats Demand Refined BYOD Policies
As the world continues to adapt to the evolving landscape of hybrid work, IT security teams find themselves at the forefront of a relentless battle against increasingly sophisticated cyber threats. With the proliferation of Bring Your Own Device (BYOD) policies in organizations, the need to carefully define and enforce security protocols has never been more…
Read more»
AI and IoT
Why AI is Key to Ensuring IoT Security in the Digital Age
The Internet of Things (IoT) has become an integral part of our daily lives, from smart homes to connected cars and beyond. However, with the increasing number of connected devices, the risk of security breaches has also grown. That's where Artificial Intelligence (AI) comes in, providing a powerful tool for enhancing IoT security.The Internet of Things (IoT) has become an integral part of our daily lives, from smart homes to connected cars and beyond. However, with the increasing number of connected devices, the risk of security breaches has also grown.
Read more»
prevent iot portnox
How to Prevent IoT from Ruining Your Life
One of the worst things you can go through as a company is a data breach. It costs a small fortune (average of $4.35 million as of 2022), destroys your reputation, often leads to bankruptcy, and takes a massive toll on your employee's well-being. Thus, preventing a data breach should be top of your to-do list. Today, that means taking a hard look at your connected endpoints - starting with IoT - and making sure you have the necessary tools to keep them from putting you at risk. 
Read more»
IoT in agriculture
IoT in Agriculture: Secure Smart Farming
The age of smart farming is here, and IoT is a major driving force behind this change. IoT in agriculture can optimize crop yields, reduce waste, improve animal health, and more. With this in mind, let's explore what IoT in agriculture is, its various use cases, and, most importantly, how we can ensure the security of IoT devices and data in this critical industry.
Read more»
IoT device monitoring
IoT Device Monitoring: Safeguarding Your Connected World
From smart homes to industrial automation, IoT devices have become ubiquitous in our daily lives. However, as the number of devices increases, so do the security risks. Hackers are constantly finding new ways to exploit vulnerabilities and gain access to sensitive information. This is where IoT device monitoring comes in - a crucial tool for businesses to keep their networks secure and their data safe.
Read more»
Everything You Need to Know About Certificate-Based Authentication
No ID? No Entry. Certificate-based authentication is a way for a computer system to verify your identity using a digital certificate instead of a traditional username and password. Think of it like a driver’s license. When you go to a bar or a liquor store, you need to prove that you’re old enough to buy…
Read more»
How Does Passwordless Authentication Fit With Zero Trust Security Models?
Will 2023 be the year we finally eliminate passwords? For the last decade, cybersecurity experts have both been pushing for and predicting that a passwordless future is just around the corner. However, while passwords have been declining in recent years in favor of more robust forms of authentication, an entirely passwordless future has yet to…
Read more»
iam security portnox
How Cloud IAM Security Vulnerabilities Are Being Exploited
What is IAM Security? IAM is an abbreviation for identity access management. Identity access management systems allow your organization to manage employee applications without checking in to each app as an administrator. IAM security solutions allow organizations to manage a variety of identities, including people, software, and hardware.   IAM Infrastructure Over the past few years, businesses…
Read more»
principle of least privilege portnox
How to Leverage the Principle of Least Privilege for Stronger Network Security
The principle of least privilege (PoLP) is an information security concept that gives applications or users minimum required network permissions to perform their jobs. Therefore, PoLP is an important aspect of privilege access management (PAM).  Implementing the principle of least privilege provides network security by avoiding needless exposure. For example, a user and employee access…
Read more»
passwordless authentication portnox
Passwordless Authentication: A Paradigm Shift in Security
Passwordless authentication appears to be the new belle of the ball amongst tech experts. Of course, the reasons all bother on the general challenges experienced by security companies and businesses. 
Read more»
portnox agentp
Worry-Free BYOD: How Portnox’s AgentP Balances Freedom & Security
It may sound cliché, but if there’s one point this decade has hammered home so far, it’s that the only constant is change. From the coronavirus pandemic to the Great Resignation, many of us are navigating new jobs and staffing changes, which means new BYOD (Bring Your Own Device) policies as work shifts from in…
Read more»
Filling the Access Security Gap With Certificate-Based Authentication
It should come as no surprise that passwords have fallen out of favor as a reliable method of authentication. This is because passwords are often weak (easily guessable), can be forgotten, and password stores become a weak point for security (if an intruder accesses the password store, they hit the motherload). Luckily, there is a…
Read more»