Many Universities make the same assupmtions concerning PEAP-MSCHAPv2

Top 3 PEAP-MSCHAPv2 Mistakes Made by Universities

Jake Ludin Consumer Protection, Education

Top 3 PEAP-MSCHAPv2 Mistakes Made by Universities

Credential-based authentication with PEAP-MSCHAPv2 is still commonly used, and for some network types it is appropriate. A home network or a small coffee shop offering free wireless can benefit from its convenience. But for any institution or university hosting valuable …

Establishing trust through authentication

EAP-TLS vs. PEAP-MSCHAPv2: Which Authentication Protocol is Superior?

Jake Ludin Education

EAP-TLS vs. PEAP-MSCHAPv2: Which Authentication Protocol is Superior?

Ensuring network users are able to securely authenticate to the wireless network is paramount to the overall safety and security of your organization. The most widely used wireless network protocols today are the Extensible Authentication Protocols (EAP) used in WPA2-Enterprise. …

public certificate authority vs. private certificate authority

Reduce the Risks of a Certificate Authority

Jake Ludin Security Threats

Reduce the Risks of a Certificate Authority

Recently, cybercriminals have begun targeting public Certificate Authorities (CA) to obtain legitimate certificates and then sell them on the black market. Because these are verified and signed certificates obtained by unjust means, it can be exceedingly difficult to identify them. …

How to Configure WPA2-Enterprise on Each Operating System

Samuel Metzler Education

How to Configure WPA2-Enterprise on Each Operating System

Automation is key for a positive user experience; the faster a monotonous task can be finished, the more time users can focus on important activities. Network authentication operates the same. Manually configuring operating systems can be a daunting task, even ...