Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!
INSIGHTS & UPDATES

SecureW2 Blogs

Stay informed with expert insights, best practices, and the latest developments in network security, identity management, and SecureW2 product updates.

AD CS: Domain Escalation Attack Scenario 1 (ESC1)

Active Directory Certificate Services (AD CS) is an essential tool for domain administrators to enhance network security, ensuring secure communication, code signing, and user authentication. Organizations can leverage the 802.1x network protocol and a certificate enrollment policy. Authenticated users can ... Read More

Read More
Simple, Practical Security Guidance for AD CS

In 2008, Microsoft released the Active Directory Certificate Services(AD CS) feature to allow Administrators to manage their own Public Key Infrastructure and their Remote Authentication Dial-In User Service(RADIUS). This paved the way for 802.1x authentication using Extended Authentication Protocols(EAP) that ... Read More

Read More
TLS (Transport Layer Security) Explained

Protecting and encrypting communications online is vitally important as there are countless attempts made daily to intercept them for nefarious purposes. From securing a bank transaction to protecting an authentication attempt, people communicate highly sensitive information online, and if it’s ... Read More

Read More
Overview of LDAP For Today’s Cloud Environment

Lightweight Directory Access Protocol (LDAP) is an integral component of digital identity frameworks, providing an open and cross-platform protocol used for directory service authentication. It provides a systematic method for querying and modifying items in a directory service, essentially facilitating ... Read More

Read More
LDAP Injection Attacks: Explained

LDAP, also known as Lightweight Directory Access Protocol, is an essential utility in network settings that facilitates getting hold of data about organizations, individuals, and resources. LDAP is commonly used for centralized authentication, providing an efficient method for validating users ... Read More

Read More
What is a PKI (Public Key Infrastructure)? | 2023 Update

The use of a Public Key Infrastructure (PKI) by an organization demonstrates a dedication to cybersecurity. It enables passwordless authentication, encrypted communication, and it has been listed by organizations such as CISA, NSA, and NIST as a foundational piece of ... Read More

Read More
Jamf RADIUS Server Best Practices

For small and medium-sized enterprises, coordinating employees’ iPhone, iPad, and Mac devices may distract you from your primary responsibilities. Jamf assists businesses in addressing this issue. The affordable cloud-based solution streamlines the administration of mobile devices, allowing you to concentrate ... Read More

Read More
MDM Security Best Practices

In the current digital environment, the proper management and security of devices within organizations are of the utmost importance. Mobile Device Management (MDM) solutions enable organizations to manage “managed devices” in this regard effectively. To achieve optimal security and safeguard ... Read More

Read More
PEAP Exploit Explained

An enterprise needs a safe, secure, and proper network infrastructure implementation to ensure a functional business environment. The Protected Extensible Authentication Protocol (PEAP) is a form of EAP protocol used by organizations to protect their data over-the-air. The PEAP authentication ... Read More

Read More
Student BYOD Wi-Fi Security Solutions

It wasn’t too long ago that accessing a school network meant logging onto a stationary desktop in a computer lab. In today’s IT environment, however, more and more devices are able to access school resources both on-site and even remotely. ... Read More

Read More