authentication security is vital to a secure network

The Importance of Authentication Security

Jake Ludin Tech Trends

The Importance of Authentication Security

Authentication acts as the gateway to allow access to valuable data only to those who are approved by the organization. But bad actors seem to be a step ahead of network security professionals. Many security professionals experience burnout in their …

Enterprise PKI Management in the Cloud

Jake Ludin Tech Trends

Enterprise PKI Management in the Cloud

As the importance of secure authentication continues to rise, many organizations are looking for lightweight, cost-efficient solutions to their cybersecurity concerns. This has caused many to question the efficacy of credential-based authentication and has sparked interest in certificate-based authentication. But …

Many Universities make the same assupmtions concerning PEAP-MSCHAPv2

Top 3 PEAP-MSCHAPv2 Mistakes Made by Universities

Jake Ludin Consumer Protection, Education

Top 3 PEAP-MSCHAPv2 Mistakes Made by Universities

Credential-based authentication with PEAP-MSCHAPv2 is still commonly used, and for some network types it is appropriate. A home network or a small coffee shop offering free wireless can benefit from its convenience. But for any institution or university hosting valuable …

Establishing trust through authentication

EAP-TLS vs. PEAP-MSCHAPv2: Which Authentication Protocol is Superior?

Jake Ludin Education

EAP-TLS vs. PEAP-MSCHAPv2: Which Authentication Protocol is Superior?

Ensuring network users are able to securely authenticate to the wireless network is paramount to the overall safety and security of your organization. The most widely used wireless network protocols today are the Extensible Authentication Protocols (EAP) used in WPA2-Enterprise. …

public certificate authority vs. private certificate authority

Reduce the Risks of a Certificate Authority

Jake Ludin Security Threats

Reduce the Risks of a Certificate Authority

Recently, cybercriminals have begun targeting public Certificate Authorities (CA) to obtain legitimate certificates and then sell them on the black market. Because these are verified and signed certificates obtained by unjust means, it can be exceedingly difficult to identify them. …

How to Configure WPA2-Enterprise and 802.1x on Each Operating System

Sam Metzler Education

How to Configure WPA2-Enterprise and 802.1x on Each Operating System

Automation is key for a positive user experience; the faster a monotonous task can be finished, the more time users can focus on important activities. Network authentication can operate the same way as long as you have the right tools. ...