Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!
INSIGHTS & UPDATES

SecureW2 Blogs

Stay informed with expert insights, best practices, and the latest developments in network security, identity management, and SecureW2 product updates.

How Does a Man-in-the-Middle (MITM) Attack Compromise Wi-Fi Networks?

An MITM happens when attackers hijack a communication channel to intercept and steal data. In this type of attack, they position themselves between a user and an application, silently capturing or altering the data by deploying a rogue access point ... Read More

Read More
What is an Evil Twin attack in Wi-Fi, and how can I protect against it?

Imagine you’re out shopping, getting coffee, or waiting for a flight. You quickly want to check your messages or search for something, so hop on a free public Wi-Fi network. But what if that network was only there to gather ... Read More

Read More
SCEP vs. Dynamic SCEP

Simple Certificate Enrollment Protocol (SCEP) streamlines secure certificate issuance across networked devices, enabling scalable authentication and encryption. Instead of relying on manual provisioning, SCEP automates the process, allowing devices to request certificates directly from the Certificate Authority (CA) through a ... Read More

Read More
What is MAC spoofing, and how does it affect Wi-Fi security?

MAC spoofing is when an attacker tricks a network by faking a device’s unique ID (MAC address) to gain unauthorized access or disrupt communication. This attack can happen in different ways, like modifying the hardware itself, spoofing the identity of ... Read More

Read More
Enabling Okta Device Trust for any MDM

The traditional network perimeter is a relic of the past. With remote work now common, users need secure access from anywhere, making outdated security models ineffective. Relying on perimeter-based defenses exposes organizations because threats no longer come only from the ... Read More

Read More
Top PKI Management Tools For A Network

Organizations should prioritize automated certificate lifecycle management to maintain complete visibility and granular control over who and what accesses their network. Managing certificates manually—distributing, renewing, and revoking them—quickly becomes tedious and error-prone, especially as your organization grows. By automating certificate ... Read More

Read More
Can I Use Azure With A RADIUS Server?

Organizations worldwide are making the transition to cloud-based network solutions. To ease the transition, Microsoft created Entra to aid clients in moving their directories from on-premise Active Directory (AD) to the cloud. However, Entra is limited compared to AD in ... Read More

Read More
Configuring Certificate Auto-Enrollment with Microsoft GPO

Enterprises that use Public Key Infrastructures (PKI) will have to issue and manage tens or even hundreds of thousands of digital certificates. Keeping track of all those certificates may seem overwhelming, which is why many smaller organizations with limited IT ... Read More

Read More
Complete Guide To Certificate Authorities

Imagine walking into a vast library, seeking a single book among millions. Without a librarian or a catalog system, you’d be lost. In many ways, the internet is that library, and a certificate authority is the librarian guiding us to ... Read More

Read More
Without Server Certificate Validation, WPA2-Enterprise Isn’t Secure

Your users have strong, unique passwords, your networks are protected with WPA2-Enterprise encryption, and you use 802.1x for authentication. WPA2-Enterprise is the gold standard when it comes to security, so you should be safe right? Think again. Our experience helping ... Read More

Read More