Can I Set Up Microsoft NPS in the Cloud?

Jake Ludin Education, Tech Trends

Can I Set Up Microsoft NPS in the Cloud?

Microsoft’s Network Policy Server (NPS) is a AAA RADIUS server used for a number of different types of network connections. It can be used for wireless authentication, VPN connections, dial-up, and more. But as organizations continue to move to cloud-based …

How to Set Up RADIUS Authentication with Google

Eytan Raphaely Education, Uncategorized

How to Set Up RADIUS Authentication with Google

It is becoming more important than ever for organizations to make the transition from antiquated pre-shared key authentication methods to RADIUS-based, 802.1x authentication for their wireless networks. However, many can find the difficulties when integrating to a WPA2-Enterprise system when …

802.1x Without Active Directory

Kainoa Lee Uncategorized

802.1x Without Active Directory

Many organizations are still having trouble moving away from Active Directory (AD). Microsoft AD has been included “free” with Windows server and Microsoft exchange, which created a dilemma for those who have decided to use them as an IDP.   …

How to Use Yubikeys for VPN

Eytan Raphaely Education

How to Use Yubikeys for VPN

Yubikeys are a useful and secure tool for protecting yourself from data theft. They add a layer of authentication and can be used with other authentication methods to further protect your data. While Yubikeys are already a powerful multi-factor authentication …

How to Issue Sectigo Certificates

Kainoa Lee Uncategorized

How to Issue Sectigo Certificates

Sectigo, formerly known as Comodo, is a leading provider of digital identity solutions. One of their main products are SSL/TLS certificates and Public Key Infrastructures (PKI), which allows the client to securely share an encryption key with a server so …

How to Prevent VPN Phishing Attacks

Eytan Raphaely Uncategorized

How to Prevent VPN Phishing Attacks

What is a Phishing Attack A phishing attack is a type of social engineering attack that is used to steal an unsuspecting user’s data through masquerading as a trusted platform. Oftentimes, the attacker will send an email, instant message, or …