Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • Can You Use Certificates for Single Sign-On (SSO)?

    Forgetting your password is one of the worst things about the internet. Unfortunately, it is encouraged to create complex passwords, making remembering them more difficult. Consequently, a considerable number of users elevate their vulnerability to cyber threats by either resorting ...

    Read More
  • [Solved] Enterprise PKI OCSP Error

    Certificate Management has emerged as one of the better alternatives to avoid the vulnerabilities of credentials in modern-day cyberspace. Here’s a recent incident of a high-profile data breach involving credentials compromise, which once again exposed the vulnerability of credentials in ...

    Read More
  • How Does WPA-Enterprise Secure Your Network

    Securely authenticating network users is a fundamental aspect of network security and is the source of significant challenges for many network administrators. Authentication security has never been more important; In 2017, over 1,300 significant data breaches occurred in the US ...

    Read More
  • How To Solve the NPS Error Code 66 in Meraki?

    The RADIUS server plays a vital role in the authentication within a network infrastructure. NPS (Network Policy Server) is Microsoft’s own RADIUS solution that performs a similar role of filtering out non-compliant network connections and ensuring the enterprise’s network is ...

    Read More
  • Public Key Infrastructure- A High-Level Overview

    Digital signatures are pivotal to cybersecurity. They offer a robust mechanism to verify the authenticity and integrity of a document or message. Imagine sending a handwritten letter; your signature assures the recipient that the letter is genuinely from you. Similarly, ...

    Read More
  • How To Test MITM Attacks And  Protect Networks

    A man-in-the-middle (MITM) attack is a highly effective type of cyber attack that involves a hacker infiltrating a private network by impersonating a rogue access point and acquiring login credentials. The attacker sets up hardware pretending to be a trusted ...

    Read More
  • How To Use RadSec For A Secure Roaming Network.

    Integrating a RADIUS server with your network security infrastructure is a wise decision. RADIUS or AAA (Authentication, Authorization, and Accounting) servers guard your network against unauthorized access by verifying individual devices, granting them different levels of authorization, and keeping activity ...

    Read More
  • Public vs Private Certificate Authority

    Certificate authorities (CAs) play a critical role in securing digital communications and data exchange. Organizations must choose between public and private CAs based on their unique security requirements, use cases, and infrastructure. Each option offers distinct advantages, with public CAs ...

    Read More
  • MacOS AD Bind Issues Post Microsoft Kerberos Update

    On October 11th, 2022 Microsoft pushed an update to enforce domain controller validation for Active Directory. The purpose of this update is to shore up a security bypass vulnerability that affects the Kerberos Privilege Attribute Certificate (PAC), allowing hackers to ...

    Read More
  • Smart Cards for Identity Authentication and Access Security

    Smart cards, occasionally called chip cards or integrated circuit cards (IC or ICC), are a broad family of physical electronic authentication devices. More practically, they’re physically-secured microprocessors used to control access to resources. From ID cards to security keys, smart ...

    Read More