Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • Public Key Infrastructure- A High-Level Overview

    Digital signatures are pivotal to cybersecurity. They offer a robust mechanism to verify the authenticity and integrity of a document or message. Imagine sending a handwritten letter; your signature assures the recipient that the letter is genuinely from you. Similarly, ...

    Read More
  • How To Test MITM Attacks And  Protect Networks

    A man-in-the-middle (MITM) attack is a highly effective type of cyber attack that involves a hacker infiltrating a private network by impersonating a rogue access point and acquiring login credentials. The attacker sets up hardware pretending to be a trusted ...

    Read More
  • How To Use RadSec For A Secure Roaming Network.

    Integrating a RADIUS server with your network security infrastructure is a wise decision. RADIUS or AAA (Authentication, Authorization, and Accounting) servers guard your network against unauthorized access by verifying individual devices, granting them different levels of authorization, and keeping activity ...

    Read More
  • Public vs Private Certificate Authority

    Certificate authorities (CAs) play a critical role in securing digital communications and data exchange. Organizations must choose between public and private CAs based on their unique security requirements, use cases, and infrastructure. Each option offers distinct advantages, with public CAs ...

    Read More
  • MacOS AD Bind Issues Post Microsoft Kerberos Update

    On October 11th, 2022 Microsoft pushed an update to enforce domain controller validation for Active Directory. The purpose of this update is to shore up a security bypass vulnerability that affects the Kerberos Privilege Attribute Certificate (PAC), allowing hackers to ...

    Read More
  • Smart Cards for Identity Authentication and Access Security

    Smart cards, occasionally called chip cards or integrated circuit cards (IC or ICC), are a broad family of physical electronic authentication devices. More practically, they’re physically-secured microprocessors used to control access to resources. From ID cards to security keys, smart ...

    Read More
  • List of Devices Supporting 802.1x

    It is hard to imagine life without Wi-Fi, both in personal or professional spaces but we can not deny that it has parallelly caused the transmission of more and more sensitive information over the air. The evolution of WPA2-Enterprise has ...

    Read More
  • How to Enable Windows Machine Certificate Authentication

    Whether you use Windows, macOS, or any other operating system, deploying digital certificates for your device can be the most impactful step to strengthening your network security. Digital certificates use superior asymmetric encryption, which uses two pairs of public and ...

    Read More
  • LDAP Authentication with Azure AD

    LDAP (Lightweight Directory Access Protocol) authentication can confirm user identities across a network. It uses a centralized directory system for user authorization and authentication. On the other hand, Microsoft offers a cloud-based identity and access management solution called Azure Active ...

    Read More