Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!
INSIGHTS & UPDATES

SecureW2 Blogs

Stay informed with expert insights, best practices, and the latest developments in network security, identity management, and SecureW2 product updates.

Public vs Private Certificate Authority

Certificate authorities (CAs) play a critical role in securing digital communications and data exchange. Organizations must choose between public and private CAs based on their unique security requirements, use cases, and infrastructure. Each option offers distinct advantages, with public CAs ... Read More

Read More
MacOS AD Bind Issues Post Microsoft Kerberos Update

On October 11th, 2022 Microsoft pushed an update to enforce domain controller validation for Active Directory. The purpose of this update is to shore up a security bypass vulnerability that affects the Kerberos Privilege Attribute Certificate (PAC), allowing hackers to ... Read More

Read More
Smart Cards for Identity Authentication and Access Security

Smart cards, occasionally called chip cards or integrated circuit cards (IC or ICC), are a broad family of physical electronic authentication devices. More practically, they’re physically-secured microprocessors used to control access to resources. From ID cards to security keys, smart ... Read More

Read More
List of Devices Supporting 802.1x

It is hard to imagine life without Wi-Fi, both in personal or professional spaces but we can not deny that it has parallelly caused the transmission of more and more sensitive information over the air. The evolution of WPA2-Enterprise has ... Read More

Read More
How to Enable Windows Machine Certificate Authentication

Whether you use Windows, macOS, or any other operating system, deploying digital certificates for your device can be the most impactful step to strengthening your network security. Digital certificates use superior asymmetric encryption, which uses two pairs of public and ... Read More

Read More
Why Apple Wants You to Use ACME vs. SCEP

In this article, we will discuss the latest ACME protocol that you can use for your iOS devices for a smooth transition to digital certificates with minimum effort.

Read More
LDAP Authentication with Azure AD

LDAP (Lightweight Directory Access Protocol) authentication can confirm user identities across a network. It uses a centralized directory system for user authorization and authentication. On the other hand, Microsoft offers a cloud-based identity and access management solution called Azure Active ... Read More

Read More
Understanding Phishing-Resistant MFA in Azure AD

On an average day, most employees have to log into numerous different applications and resources at work. The influx of applications necessary for work has led to an exponential increase in login and authentication methods, including things such as one-time ... Read More

Read More
How to Generate Root & Intermediate CAs

With 10 million attacks targeting usernames and passwords occur every day. it’s not a bad idea to drop passwords wherever possible.  A proper PKI allows your network to utilize certificate-based authentication. Root CAs and Intermediate CAs are both parts of ... Read More

Read More
What’s the Difference between RADIUS, TLS, and EAP-TLS?

There are many components involved in running a secure network. It’s very easy to get bogged down by different terminology and be confused about what exactly each component does. This is especially true in regards to 802.1X. 62% of breaches ... Read More

Read More