public certificate authority vs. private certificate authority

Reduce the Risks of a Certificate Authority

Jake Ludin Security Threats

Reduce the Risks of a Certificate Authority

Recently, cybercriminals have begun targeting public Certificate Authorities (CA) to obtain legitimate certificates and then sell them on the black market. Because these are verified and signed certificates obtained by unjust means, it can be exceedingly difficult to identify them. …

yubikey certificate

Using Digital Certificates on Yubikey

Patrick Grubbs Tech Trends

Using Digital Certificates on Yubikey

Yubikeys are an incredibly secure method of protecting yourself from data theft, but you’re probably not using them to their full potential. Natively, Yubikeys only support credential-based authentication through keypairs and one-time passwords. However, SecureW2 has developed an industry-first solution …

TTLS-PAP as an authentication method is weaker than others available

EAP-TTLS/PAP Authentication Protocol Is Not Secure

Jake Ludin Uncategorized

EAP-TTLS/PAP Authentication Protocol Is Not Secure

When designing a new network, there are countless features to consider that have a significant impact on the organization at large. Few functions of the network impact the users more than the authentication method chosen by decision makers. If an …

PEAP-MSCHAPv2 Vulnerability Allows For Credential Theft

News Security Threats

PEAP-MSCHAPv2 Vulnerability Allows For Credential Theft

In 2013, Microsoft released a report of a known security vulnerability present within Wi-Fi authentication. The 802.1x authentication protocol known as PEAP-MSCHAPv2, a widely supported standard, can be exploited to gain user login information from devices which are not properly ...

Best Practices for AD CS Configuration

Samuel Metzler Education

Best Practices for AD CS Configuration

Many companies use Windows servers as the main component of their IT infrastructures. If those companies want to use digital certificates for their network, they set up a public key infrastructure (PKI). PKIs deploy and manage certificates, which can be …

How MFA was broken by a hacker group

Stronger Multi-Factor Authentication With Certificates

Jake Ludin Consumer Protection, Security Threats

Stronger Multi-Factor Authentication With Certificates

It’s widely held knowledge that using a single factor for authentication to wireless networks is less than secure and easily exploited by hackers. Many organizations recognize this and utilize Multi-Factor Authentication (MFA) to an extra layer of protection. Each additional …

Digital Certificates vs Password Authentication

Samuel Metzler Education, Security Threats

Digital Certificates vs Password Authentication

Businesses understand the importance of passwords for private data security, but might not realize that using a network with passwords poses many security threats. Every advancement in security technology is followed by more sophisticated hacking techniques. Credentials require password change …