man in the middle attack

Man-in-the-Middle (MITM) Attacks: Explained

Sam Metzler Data Breach, Security Threats

Man-in-the-Middle (MITM) Attacks: Explained

If you’ve ever watched this scene from Spongebob Squarepants, then you have a basic understanding of a man-in-the-middle (MITM) attack. How Does a Man-in-the-Middle Attack Work? The attacker sets up rogue hardware pretending to be a trusted network, namely Wi-Fi, …

mitm attacks

Preventing Man-in-the-middle (MITM) Attacks: The Ultimate Guide

Sam Metzler Tech Trends

Preventing Man-in-the-middle (MITM) Attacks: The Ultimate Guide

A man-in-the-middle (MITM) attack is an incredibly dangerous type of cyber attack that involves a hacker infiltrating a private network by impersonating a rogue access point and acquiring login credentials. According to IBM’s X-Force Threat Intelligence Index, 35% of exploitation …

How To Use Azure AD With 802.1x

Eytan Raphaely Education

How To Use Azure AD With 802.1x

Organizations from around the world are making the much needed transition to cloud-based network solutions. To ease the transition, Microsoft created Azure to aid clients moving their directories from the on-premise Active Directory (AD) to the cloud. However, Azure is …

The Best Way to Manage Microsoft Certificates

Sam Metzler Education

The Best Way to Manage Microsoft Certificates

Digital certificates are quickly becoming the network security standard for major enterprises because the abilities of certificates far exceed the abilities of passwords. Passwords are an obsolete form of authentication because there are major vulnerabilities in security and user experience. …

Many organizations are moving on from the cumbersome LDAP protocol

Why Most Are Leaving LDAP With WPA2-Enterprise Behind

Jake Ludin Tech Trends

Why Most Are Leaving LDAP With WPA2-Enterprise Behind

For years, the credential-based network authentication standard was the Lightweight Directory Access Protocol (LDAP). The security and efficiency offered by LDAP provided the necessary protection levels for everyday WPA2-Enterprise operations. But as time progressed, new methods of authentication have been …

eap and peap

Can I Use PEAP-MSCHAPv2 and EAP-TLS Authentication on My Network?

Patrick Grubbs Education

Can I Use PEAP-MSCHAPv2 and EAP-TLS Authentication on My Network?

The short answer is: Yes. Organizations that are interested in moving from the unsecure PEAP-MSCHAPv2 protocol to the superior EAP-TLS protocol might be worried about huge infrastructure overhaul or the network downtime it might entail. We’ve helped many organizations over …

Simple Certificate Enrollment Protocol (SCEP): Explained

Sam Metzler Education

Simple Certificate Enrollment Protocol (SCEP): Explained

Distributing certificates to managed devices can be a monumental task with a lot of moving parts that need to be accounted for: PKI integration, establishing a gateway, configuration policies, certificate enrollment, device authentication, and much more. Luckily, SCEP provides a …