Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!
INSIGHTS & UPDATES

SecureW2 Blogs

Stay informed with expert insights, best practices, and the latest developments in network security, identity management, and SecureW2 product updates.

Jamf vs. Intune: The Best Way to Manage Apple Devices

The rise in hybrid work culture has increased the usage of mobile devices such as smartphones and tablets for corporate purposes. Organizations must strengthen the security of these devices to ensure that every endpoint is protected. Efficiently managed devices are critical in ... Read More

Read More
A Comprehensive Review of Certificate Pinning: The Challenges and Alternatives

While digital certificates undoubtedly provide a more secure authentication method than passwords, some organizations still fear the possibility that certificates can be issued to unauthorized parties. Certificate pinning is a security strategy designed to prevent this from occurring by creating ... Read More

Read More
A Deep Dive into the Security of WPA2-PSK

In Wi-Fi security, one protocol stands out for its widespread adoption and significant role in protecting data: WPA2-PSK. This protocol, short for Wi-Fi Protected Access 2 – Pre-Shared Key, has been instrumental in securing wireless networks against unauthorized access and ... Read More

Read More
Can You Use Certificates for Single Sign-On (SSO)?

Forgetting your password is one of the worst things about the internet. Unfortunately, it is encouraged to create complex passwords, making remembering them more difficult. Consequently, a considerable number of users elevate their vulnerability to cyber threats by either resorting ... Read More

Read More
[Solved] Enterprise PKI OCSP Error

Certificate Management has emerged as one of the better alternatives to avoid the vulnerabilities of credentials in modern-day cyberspace. Here’s a recent incident of a high-profile data breach involving credentials compromise, which once again exposed the vulnerability of credentials in ... Read More

Read More
How Does WPA-Enterprise Secure Your Network

Securely authenticating network users is a fundamental aspect of network security and is the source of significant challenges for many network administrators. Authentication security has never been more important; In 2017, over 1,300 significant data breaches occurred in the US ... Read More

Read More
How To Solve the NPS Error Code 66 in Meraki?

The RADIUS server plays a vital role in the authentication within a network infrastructure. NPS (Network Policy Server) is Microsoft’s own RADIUS solution that performs a similar role of filtering out non-compliant network connections and ensuring the enterprise’s network is ... Read More

Read More
Public Key Infrastructure- A High-Level Overview

Digital signatures are pivotal to cybersecurity. They offer a robust mechanism to verify the authenticity and integrity of a document or message. Imagine sending a handwritten letter; your signature assures the recipient that the letter is genuinely from you. Similarly, ... Read More

Read More
How To Test MITM Attacks And  Protect Networks

A man-in-the-middle (MITM) attack is a highly effective type of cyber attack that involves a hacker infiltrating a private network by impersonating a rogue access point and acquiring login credentials. The attacker sets up hardware pretending to be a trusted ... Read More

Read More
How To Use RadSec For A Secure Roaming Network.

Integrating a RADIUS server with your network security infrastructure is a wise decision. RADIUS or AAA (Authentication, Authorization, and Accounting) servers guard your network against unauthorized access by verifying individual devices, granting them different levels of authorization, and keeping activity ... Read More

Read More