image for certificate security

Launching Certificate-Based Security Shouldn’t be Intimidating

Jake Ludin Education

Launching Certificate-Based Security Shouldn’t be Intimidating

Historically, some have avoided EAP-TLS certificate-based authentication for wireless security because the overhead costs of setting up and managing this network type end up outweighing the security benefits. To properly configure the network for certificate-based authentication, you’d have to configure …

Credential theft of an SMB

Credential Theft Threats Facing SMBs

Jake Ludin Security Threats

Credential Theft Threats Facing SMBs

Data and credential theft have become an increasingly prevalent concern for SMBs as more attackers choose to target them. It’s common to hear about large scale hacks, such as Target, Yahoo, or Equifax, but far less frequently reported are attacks …

Dinosaurs Among Us: The Archaic Protocol at the Heart of Secure Wireless

Adam Education

Dinosaurs Among Us: The Archaic Protocol at the Heart of Secure Wireless

At SecureW2, we develop a lot of technology for wireless security, more specifically 802.1X. If you’re not familiar 802.1X, it’s the basis of WPA2-Enterprise networks that corporations, colleges, and other large organizations use. And inside the vast majority of these …

Samsung Keyboards Vulnerable to Man-in-the-Middle Exploit

News Security Threats

Samsung Keyboards Vulnerable to Man-in-the-Middle Exploit

During a presentation at BlackHat London in early June, a major vulnerability in software that comes bundled with Samsung phones was unveiled. The bug, uncovered by NowSecure researcher Ryan Welton, lets intruders hijack software updates for Swiftkey, the device’s default ...
Using incorrect certificates on your network

Stop using self-signed certificates for 802.1X

Adam Education, Uncategorized

Stop using self-signed certificates for 802.1X

When setting up 802.1X we often run into questions about using self signed certificates for WPA2-Enterprise server certificate validation.  First, we should clarify the difference between a self-signed certificate and a private Certificate Authority — this is often a point of …

LogJam- Another cryptography bug from the past

News Uncategorized

LogJam- Another cryptography bug from the past

A team of researchers recently discovered a new vulnerability that significantly weakens the encrypted connection between a user and web or email server, potentially putting your secure web information at risk. This latest flaw, named the “LogJam” bug, affects all …

Face-off server certificate validation

802.1X and HTTPS face off when it comes to server certificate validation

Adam Uncategorized

802.1X and HTTPS face off when it comes to server certificate validation

This is part 2 of our series on server certificate validation. In talking with many customers about setting up RADIUS certificates, it is clear many admins have a difficult time describing the server certification validation process to their user base. …

Staying up to date with updating technology

How can businesses keep up? The global WLAN security market predicted to skyrocket within the next 5 years.

News Tech Trends

How can businesses keep up? The global WLAN security market predicted to skyrocket within the next 5 years.

The latest and greatest smartphones are more likely to have productivity apps that foster innovation within the workplace. How can businesses say no when these devices enhance employee performance? According to a report published by TechNavio in December, wireless security …