Want to learn the best practice for configuring Chromebooks with 802.1X authentication?

Sign up for a Webinar!

Blogs

  • Managed PKI VS Private PKI

    Deciding between a managed PKI and a private PKI is a difficult decision. Each method of PKI management has advantages and disadvantages, and if you’re coming from a place of little experience, it can be daunting to choose one. We’ve ...

    Read More
  • What is S/MIME and Do I Need It?

    What is S/MIME? S/MIME stands for “Secure/Multipurpose Internet Mail Extensions”. It’s an IETF standard for public key encryption, as well as for creating a digital signature for MIME data. In essence, S/MIME uses a PKI to enroll an email client ...

    Read More
  • Top 4 Managed PKI Use Cases

    A Managed PKI is a vital part of any comprehensive network security strategy. It allows you to use digital certificates for authentication, a form of credential that’s much more secure and widely-applicable than passwords. Certificates offer the following advantages: Certificates ...

    Read More
  • It’s Time For SHA-1 Hash To End

    SHA-1 is a commonly used cryptographic hash algorithm that has been used for nearly 2 decades to secure online communications. It was originally designed for government use, but an exploit was discovered and its official government use was phased out. ...

    Read More
  • Phishing Scams Are Now Capitalizing on Coronavirus

    COVID-19, better known as the Coronavirus, is spreading throughout the world right now and has a lot of people concerned. This has led to scammers incorporating the virus into their phishing attacks to trick people out of their private information ...

    Read More
  • How To Address America’s Ransomware Threats

    Over the course of the 2010s, ransomware attacks on city and state governments have increased in number and effectiveness. The lack of proper cybersecurity measures has highlighted a weakness in the US’s preparedness and ability to protect government data. The ...

    Read More
  • Combating Burnout in Cybersecurity

    Cybersecurity professionals are highly sought-after individuals that add an immense amount of value to an organization, but that value can be difficult to pin down in terms of dollars. As a result, they tend to be under-represented within some organizations. ...

    Read More
  • PPSK Is Not an Alternative to 802.1x

    Believe it or not, the aging WPA-Personal protocol has seen some innovation in the past few years. Several companies have developed unique PSK authentication protocols with varying names, though “Private PSK” (PPSK) has emerged as the commonly-accepted phrase. Here are ...

    Read More
  • Can I Use PEAP-MSCHAPv2 and EAP-TLS Authentication on My Network?

    The short answer is: Yes. Organizations that are interested in moving from the unsecure PEAP-MSCHAPv2 protocol to the superior EAP-TLS protocol might be worried about huge infrastructure overhaul or the network downtime it might entail. We’ve helped many organizations over ...

    Read More
  • Top 3 PEAP-MSCHAPv2 Mistakes Made by Universities

    Credential-based authentication with PEAP-MSCHAPv2 is still commonly used, and for some network types it is appropriate. A home network or a small coffee shop offering free wireless can benefit from its convenience. But for any institution or university hosting valuable ...

    Read More