Blog articles
RCDevs Security Articles
Offline MFA and Critical Infrastructure IAM for Air-Gapped Security
Air-gapped networks—those physically isolated from unsecured networks and the internet—remain the last bastion of cybersecurity for organizations where a breach could be …
Secure Access Control in Uncertain Times: Why a European-Built Stack Matters
Infrastructure and security teams today are operating in a context shaped by geopolitical instability, shifting regulations, and increasing scrutiny over digital supply …
Strengthening IT Security Through Good Infrastructure Hygiene
Maintaining clean, organized, and up-to-date infrastructure is a key aspect of a secure and resilient IT environment. Infrastructure and system hygiene refers …
Enhancing Compatibility: Kerberos Support in OpenOTP
Kerberos remains a cornerstone authentication protocol for organizations operating on-premises Active Directory (AD) environments. While modern protocols like SAML, OpenID, and OAuth …
OpenOTP Natively Integrates with Entra ID EAM
Managing identities and securing access are becoming increasingly complex as businesses transition to cloud-based services and hybrid work models. With OpenOTP’s latest …
Understanding IoT Threats & How to Mitigate Them
The Internet of Things (IoT) is changing industries and enabling new ways to connect devices and systems. With billions of connected devices, …
OneIAM – A Flexible Solution for Modern Identity and Access Management
As businesses expand and evolve, their IT infrastructures often become increasingly fragmented. This fragmentation typically arises from mergers, acquisitions, onboarding new subsidiaries, …