TTLS-PAP as an authentication method is weaker than others available

EAP-TTLS/PAP Authentication Protocol Is Not Secure

Jake Ludin Uncategorized

EAP-TTLS/PAP Authentication Protocol Is Not Secure

When designing a new network, there are countless features to consider that have a significant impact on the organization at large. Few functions of the network impact the users more than the authentication method chosen by decision makers. If an …

This artilce discusses some of the common questions we receive about PKIs

Public Key Infrastructure: Explained

Jake Ludin Education

Public Key Infrastructure: Explained

The use of a Public Key Infrastructure (PKI) by an organization demonstrates a dedication to the security of the network and the effectiveness of public key encryption and certificate-based networks. The purpose of a PKI is to manage the public …

Don’t FREAK out just yet: Microsoft, Google and others provide crucial patches to combat the latest encryption bug

Adam Consumer Protection, Security Threats

Don’t FREAK out just yet: Microsoft, Google and others provide crucial patches to combat the latest encryption bug

In a recent discovery by French researchers in conjunction with Microsoft Research, the SSL/TLS protocols used to encrypt connections between browsers and website servers were found to be vulnerable on a variety of commonly used operating systems and browsers, including …