Archives for Enterprise I.T.
Second Factor Options – Google Auth, Yubi Keys, Security Questions…
Second Factor in MFA: YubiKeys vs Security Questions vs SMS Texts vs TOTP Apps 1) YubiKeys (Hardware Security Keys — FIDO2/U2F) Strongest protection: public-key crypto; resistant to phishing, SIM-swaps,…
SolarWinds vs SentinelOne Comparison
SolarWinds vs SentinelOne When comparing SolarWinds and SentinelOne, it helps to clarify that they serve different (though sometimes overlapping) segments of IT and security management. Below is a breakdown…
Thales HSM – Key Concepts
Thales HSM – Key Concepts Applies to Luna, nShield, and Thales Data Protection on Demand (DPoD) 1) What an HSM Does Tamper-resistant hardware for generating, storing, and using cryptographic keys…
File Transfer versus APIs
API vs File Transfer: Choosing the Right Method for Data Exchange APIs and file transfers are both widely used methods for data exchange between systems. While they serve a similar…
API Hosting and Routing using NGNIX
Using Nginx for Hosting and Routing APIs 1. Hosting APIs with Nginx When used to host APIs, Nginx serves as a reverse proxy that receives incoming HTTP(S) requests and…
Moving your site behind Cloudflare
Step-by-Step Guide: Moving a Website Behind Cloudflare 1. Add Your Website to Cloudflare Sign in to Cloudflare. Click Add Site and enter your domain (, ). Cloudflare will scan existing…
Security Questions in 2025
Security Questions in 2025: Recovery Crutch or (Bad) Second Factor? Security questions (“What was your first pet’s name?”) have been used for decades to prove “something you know.” Today,…