<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1703665079923990&amp;ev=PageView&amp;noscript=1">
Skip to main content

Blog

Blog Category // Zero-Trust

What is Zero Trust? Tips for the Average Organization

Is the network perimeter dead, or just distributed? In the earliest days of digital networking, organizations used firewalls as a boundary wall between an organization and the outside risks posed by the internet. It was a security framework that worked well at first — so ...

Your Role in Cybersecurity

Cybersecurity is complex and constantly changing, so as the threats continue to rise, you may wonder, "whose responsibility is cybersecurity?"

The MFA Challenge & Cisco Duo

Ascend Technologies has previously written about the benefits of Multi-Factor Authentication (MFA) for securing resources. Many use the Microsoft Authenticator application, which provides a nice user interface and is beneficial for a variety of use cases. In 2020, our ...