Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • 3 Security Advantages of a Cloud RADIUS Server

    In order to successfully configure a WPA2-Enterprise network you must have a RADIUS server. The RADIUS authorizes and authenticates users signing into the network and eliminates any speculation into who is using your network. A properly configured Cloud RADIUS can ...

    Read More
  • Why ECC is the Solution for IoT Security

    ECC, or Eliptical Curve Cryptography, isn’t a new technology – it’s relatively old, actually, Despite being around since 1985, it has just recently begun to gain popularity as an alternative, possibly superior, form of public key cryptography. So what’s the ...

    Read More
  • Using VPN for Remote Work? Don’t Make this VPN Security Mistake

    We have never been more connected with others than we are today. The workforce is quickly moving to mobile devices. Remote work has picked up dramatically due to the COVID-19 pandemic, so VPNs are needed more now than ever before. ...

    Read More
  • 3 Best Practices for Onboarding BYODs

    Bring Your Own Device (BYOD) systems can be an amazing tool for businesses or schools looking to increase productivity and reduce cost. According to a study by Forbes, 42 percent of those who use their own devices at work say ...

    Read More
  • Why Most Are Leaving LDAP With WPA2-Enterprise Behind

    For years, the credential-based network authentication standard was the Lightweight Directory Access Protocol (LDAP). The security and efficiency offered by LDAP provided the necessary protection levels for everyday WPA2-Enterprise operations. But as time progressed, new methods of authentication have been ...

    Read More
  • Managed PKI VS Private PKI

    Deciding between a managed PKI and a private PKI is a difficult decision. Each method of PKI management has advantages and disadvantages, and if you’re coming from a place of little experience, it can be daunting to choose one. We’ve ...

    Read More
  • What is S/MIME and Do I Need It?

    What is S/MIME? S/MIME stands for “Secure/Multipurpose Internet Mail Extensions”. It’s an IETF standard for public key encryption, as well as for creating a digital signature for MIME data. In essence, S/MIME uses a PKI to enroll an email client ...

    Read More
  • Top 4 Managed PKI Use Cases

    A Managed PKI is a vital part of any comprehensive network security strategy. It allows you to use digital certificates for authentication, a form of credential that’s much more secure and widely-applicable than passwords. Certificates offer the following advantages: Certificates ...

    Read More
  • It’s Time For SHA-1 Hash To End

    SHA-1 is a commonly used cryptographic hash algorithm that has been used for nearly 2 decades to secure online communications. It was originally designed for government use, but an exploit was discovered and its official government use was phased out. ...

    Read More
  • Phishing Scams Are Now Capitalizing on Coronavirus

    COVID-19, better known as the Coronavirus, is spreading throughout the world right now and has a lot of people concerned. This has led to scammers incorporating the virus into their phishing attacks to trick people out of their private information ...

    Read More