mitm attacks

Preventing Man-in-the-middle (MITM) Attacks: The Ultimate Guide

Sam Metzler Tech Trends

Preventing Man-in-the-middle (MITM) Attacks: The Ultimate Guide

A man-in-the-middle (MITM) attack is an incredibly dangerous type of cyber attack that involves a hacker infiltrating a private network by impersonating a rogue access point and acquiring login credentials. According to IBM’s X-Force Threat Intelligence Index, 35% of exploitation …

Enterprise PKI Management in the Cloud

Jake Ludin Tech Trends

Enterprise PKI Management in the Cloud

As the importance of secure authentication continues to rise, many organizations are looking for lightweight, cost-efficient solutions to their cybersecurity concerns. This has caused many to question the efficacy of credential-based authentication and has sparked interest in certificate-based authentication. But …

Many organizations are moving on from the cumbersome LDAP protocol

Why Most Are Leaving LDAP With WPA2-Enterprise Behind

Jake Ludin Tech Trends

Why Most Are Leaving LDAP With WPA2-Enterprise Behind

For years, the credential-based network authentication standard was the Lightweight Directory Access Protocol (LDAP). The security and efficiency offered by LDAP provided the necessary protection levels for everyday WPA2-Enterprise operations. But as time progressed, new methods of authentication have been …

3 Mistakes Universities Make Deploying 802.1x and WPA2-Enterprise

Micah Spady Tech Trends

3 Mistakes Universities Make Deploying 802.1x and WPA2-Enterprise

Over the past decade, we’ve helped hundreds of organizations around the world secure and set up WPA2-Enterprise networks. While WPA2-Enterprise remains the golden standard for 802.1x authentication, there are many pitfalls an organization can make when they set it up. …

yubikey certificate

Using Digital Certificates on Yubikey

Patrick Grubbs Tech Trends

Using Digital Certificates on Yubikey

Yubikeys are an incredibly secure method of protecting yourself from data theft, but you’re probably not using them to their full potential. Natively, Yubikeys only support credential-based authentication through keypairs and one-time passwords. However, SecureW2 has developed an industry-first solution …