Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!
INSIGHTS & UPDATES

SecureW2 Blogs

Stay informed with expert insights, best practices, and the latest developments in network security, identity management, and SecureW2 product updates.

How to Configure Kandji SCEP Profile

Digital certificates have, time and again, proven to be more secure than credential or password-based authentication as they are phishing-resistant. However, manually distributing digital certificates is a considerable challenge for network administrators in larger organizations. Simple Certificate Enrollment Protocol (SCEP) ... Read More

Read More
What Are Virtual Smart Cards?

In the world of authentication cybersecurity, a device growing in popularity is the Smart Card. A smart card, like those produced by Yubico, is a cryptographic tool that allows users to securely authenticate their identity. It can be used for ... Read More

Read More
SHA-2 vs ECC: Digital Certificate Encryption Advancements

Cryptographic systems are at the heart of digital certificates, enabling encryption, authentication, and integrity. SHA-2 and ECC are two pivotal technologies that protect everything from SSL certificates to system integrity checks. These tools act as digital shields, ensuring private communication ... Read More

Read More
2024 Security Analysis of PEAP-MSCHAPv2

These days, wired and wireless (Wi-Fi) networks are ubiquitous. Organizations need these connections to perform critical business functions, but these connections are susceptible to various ever-evolving cyber threats. As a result, many different ways of protecting networks exist, including using ... Read More

Read More
Network-as-a-Service (NaaS): Explained

NaaS, or Network as a Service, is a cloud-based networking model that modifies how businesses handle and use their networks. Instead of having a lot of network equipment on-site, you can subscribe to network services on a pay-as-you-go basis. NaaS ... Read More

Read More
[Solved] Jamf Casper Certificate Error

Apple devices and gadgets have been unparalleled in cutting-edge technology and customer satisfaction over the years. In a recent interview, the CIO of Jamf Linh Lam predicted Apple to reach the pinnacle of enterprise endpoint by 2030. On a similar ... Read More

Read More
WPA3-Enterprise: Should you Adopt It?

WPA (Wi-Fi Protected Access) was created in the early 2000s when IT professionals quickly realized that WEP (Wired Equivalency Protocol) had terrible security vulnerabilities. WPA2 was ratified in 2004 as a more secure iteration of the protocol and is what ... Read More

Read More
Is RadSec Necessary for Eduroam?

Students and staff who visit other colleges and universities frequently encounter challenges accessing safe Wi-Fi networks. Without an integrated system, they may encounter connectivity challenges, different login procedures, or concerns about data security on new networks. These barriers can impede ... Read More

Read More
Complete Guide to Android 802.1X

In this article, we’ll examine a crucial authentication method for keeping your Android devices secure while connecting to networks. It’s called 802.1X authentication. This specific security approach ensures only the designated devices can access a network. Consider it a secret ... Read More

Read More
The Dangers of Self-Signed Certificates

Self-signed certificates continue to pose critical risks to organizations prioritizing secure communication. While they may seem convenient for quick deployments, their inherent vulnerabilities can lead to severe security and operational challenges. A self-signed SSL certificate, generated by the same entity ... Read More

Read More
Solved: Error “Cannot Manage Active Directory Certificate Services”

Admins configuring Active Directory Certificate Services (AD CS) for their network may encounter the following error message: Cannot manage active directory certificate services. The system cannot find the file specified: 0x800700002 (WIN32: 2 ERROR_FILE_NOT_FOUND) Fortunately, this error is usually easily ... Read More

Read More
What is PIV (Personal Identity Verification)?

Personal Identity Verification (PIV) is a security standard detailed in NIST FIPS 201-2 that creates a framework for multi-factor authentication (MFA) on a smartcard. While PIV was originally designed for the US government, it has seen widespread use in commercial ... Read More

Read More