How to Use Google for 802.1x Wi-Fi

Kainoa Lee Education

How to Use Google for 802.1x Wi-Fi

Organizations are making the much-needed transition to cloud-based network solutions and Google is a forerunner in getting people’s devices and networks in the cloud. However, for some, getting your devices configured and ready for WPA2-Enterprise Wi-Fi can be tricky and …

man in the middle attack

Man-in-the-Middle (MITM) Attacks: Explained

Sam Metzler Data Breach, Security Threats

Man-in-the-Middle (MITM) Attacks: Explained

If you’ve ever watched this scene from Spongebob Squarepants, then you have a basic understanding of a man-in-the-middle (MITM) attack. How Does a Man-in-the-Middle Attack Work? The attacker sets up rogue hardware pretending to be a trusted network, namely Wi-Fi, …

mitm attacks

Preventing Man-in-the-middle (MITM) Attacks: The Ultimate Guide

Sam Metzler Tech Trends

Preventing Man-in-the-middle (MITM) Attacks: The Ultimate Guide

A man-in-the-middle (MITM) attack is an incredibly dangerous type of cyber attack that involves a hacker infiltrating a private network by impersonating a rogue access point and acquiring login credentials. According to IBM’s X-Force Threat Intelligence Index, 35% of exploitation …

How To Use Azure AD With 802.1x

Eytan Raphaely Education

How To Use Azure AD With 802.1x

Organizations from around the world are making the much needed transition to cloud-based network solutions. To ease the transition, Microsoft created Azure to aid clients moving their directories from the on-premise Active Directory (AD) to the cloud. However, Azure is …

The Best Way to Manage Microsoft Certificates

Sam Metzler Education

The Best Way to Manage Microsoft Certificates

Digital certificates are quickly becoming the network security standard for major enterprises because the abilities of certificates far exceed the abilities of passwords. Passwords are an obsolete form of authentication because there are major vulnerabilities in security and user experience. …

Many organizations are moving on from the cumbersome LDAP protocol

Why Most Are Leaving LDAP With WPA2-Enterprise Behind

Jake Ludin Tech Trends

Why Most Are Leaving LDAP With WPA2-Enterprise Behind

For years, the credential-based network authentication standard was the Lightweight Directory Access Protocol (LDAP). The security and efficiency offered by LDAP provided the necessary protection levels for everyday WPA2-Enterprise operations. But as time progressed, new methods of authentication have been …