Join Us at Oktane 2025! September 24-26 | Caesars Palace, Las Vegas | Booth S6

Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!
INSIGHTS & UPDATES

SecureW2 Blogs

Stay informed with expert insights, best practices, and the latest developments in network security, identity management, and SecureW2 product updates.

Simple, Practical Security Guidance for AD CS

In 2008, Microsoft released the Active Directory Certificate Services(AD CS) feature to allow Administrators to manage their own Public Key Infrastructure and their Remote Authentication Dial-In User Service(RADIUS). This paved the way for 802.1x authentication using Extended Authentication Protocols(EAP) that ... Read More

Read More
TLS (Transport Layer Security) Explained

Protecting and encrypting communications online is vitally important as there are countless attempts made daily to intercept them for nefarious purposes. From securing a bank transaction to protecting an authentication attempt, people communicate highly sensitive information online, and if it’s ... Read More

Read More
Overview of LDAP For Today’s Cloud Environment

Lightweight Directory Access Protocol (LDAP) is an integral component of digital identity frameworks, providing an open and cross-platform protocol used for directory service authentication. It provides a systematic method for querying and modifying items in a directory service, essentially facilitating ... Read More

Read More
LDAP Injection Attacks: Explained

LDAP, also known as Lightweight Directory Access Protocol, is an essential utility in network settings that facilitates getting hold of data about organizations, individuals, and resources. LDAP is commonly used for centralized authentication, providing an efficient method for validating users ... Read More

Read More
What is a PKI (Public Key Infrastructure)? | 2023 Update

The use of a Public Key Infrastructure (PKI) by an organization demonstrates a dedication to cybersecurity. It enables passwordless authentication, encrypted communication, and it has been listed by organizations such as CISA, NSA, and NIST as a foundational piece of ... Read More

Read More
Jamf RADIUS Server Best Practices

For small and medium-sized enterprises, coordinating employees’ iPhone, iPad, and Mac devices may distract you from your primary responsibilities. Jamf assists businesses in addressing this issue. The affordable cloud-based solution streamlines the administration of mobile devices, allowing you to concentrate ... Read More

Read More
MDM Security Best Practices

In the current digital environment, the proper management and security of devices within organizations are of the utmost importance. Mobile Device Management (MDM) solutions enable organizations to manage “managed devices” in this regard effectively. To achieve optimal security and safeguard ... Read More

Read More
PEAP Exploit Explained

An enterprise needs a safe, secure, and proper network infrastructure implementation to ensure a functional business environment. The Protected Extensible Authentication Protocol (PEAP) is a form of EAP protocol used by organizations to protect their data over-the-air. The PEAP authentication ... Read More

Read More
Student BYOD Wi-Fi Security Solutions

It wasn’t too long ago that accessing a school network meant logging onto a stationary desktop in a computer lab. In today’s IT environment, however, more and more devices are able to access school resources both on-site and even remotely. ... Read More

Read More
How to Connect to Passpoint Wi-Fi on iOS

In a nutshell, Passpoint is a protocol developed by the Wi-Fi Alliance that allows users to connect securely to a Wi-Fi hotspot. Designed to operate like roaming works for cellular networks, Passpoint provides seamless roaming between different Wi-Fi carriers and ... Read More

Read More
802.1X Port Security Simplified

Did you know that the cost of data breaches reached a whopping $4.35 million in 2022? Data breaches cost organizations a lot in penalties and lost business opportunities. Almost 68% of organizations that had suffered a breach had to increase ... Read More

Read More
Are Password Managers Secure?

Everyone uses numerous accounts on the internet these days. Take yourself as an example; you most certainly have a minimum of one social network account, one email address, one for online shopping, and most likely one for online banking. There’s ... Read More

Read More