Tag: mitm

Limited Validity, Stronger Security!
PKI/Certificates September 15, 2025
Short-Lived Certificates: Worth the Hype or Operational Headache?

In PKI, certificate lifespans have always been a balancing act between security and operational simplicity. The industry standard has preferred longer-lived certificates valid for one year, and sometimes even for...

Your network, cloud-enabled. Secure and Effortless.
RADIUS September 12, 2025
How to Create a Cloud-Based RADIUS Server

In order to successfully configure a WPA2-Enterprise network, a RADIUS server is a must. The RADIUS authorizes and authenticates users signing into the network and eliminates any speculation into who...

MITM vs. AITM: Breaking Down the Layers of Modern Identity Attacks
Risks & Threats July 29, 2025
What is the difference between MITM and AITM?

A traditional Man-in-the-Middle (MITM) attack primarily involves an attacker passively intercepting a communication channel to eavesdrop or steal static credentials, such as passwords. The Adversary-in-the-Middle (AITM) attack takes this a...

Stop hackers midstream—block MITM with EAP-TLS.
Risks & Threats February 10, 2025
How Does a Man-in-the-Middle (MITM) Attack Compromise Wi-Fi Networks?

A MITM happens when attackers hijack a communication channel to intercept and steal data. In this type of attack, they position themselves between a user and an application, silently capturing...

Not every Wi-Fi is your friend - trust certificates, not signals.
Risks & Threats February 7, 2025
What is an Evil Twin attack in Wi-Fi, and how can I protect against it?

Imagine you’re out shopping, getting coffee, or waiting for a flight. You quickly want to check your messages or search for something, so hop on a free public Wi-Fi network....

Secure your network - stop DNS attacks before they reach your users!
Risks & Threats November 21, 2024
Top 6 Ways To Prevent Your Network From DNS Poisoning Attacks

As we increasingly rely on the internet for both personal and professional activities, understanding the potential threats to our online security becomes essential. A prevalent and significant risk is DNS...

Stop MITM attacks before they even start.
Risks & Threats October 27, 2024
Preventing Man-in-the-Middle (MITM) Attacks: The Ultimate Guide

A man-in-the-middle (MITM) attack is an incredibly dangerous type of cyber attack that involves a hacker infiltrating a private network by impersonating a rogue access point and acquiring login credentials....

Is Your Coworking Wi-Fi Secure? Here’s How to Fix It.
Wi-Fi & Wired Security October 23, 2024
Coworking Wi-Fi Security Best Practices: How to Protect Shared Networks

Coworking spaces are on the rise with  the increase in the number of remote workers. Many organizations have moved towards coworking as the shared office model offers similar benefits as that of a...

Google Workspace Security: Complete Guide to Certificate Management
Risks & Threats October 23, 2024
Attack Vectors That Leave Your 802.1X Network Vulnerable

When used correctly, 802.1X authentication is the gold standard for network security. However, even seasoned IT professionals fail to recognize some key points of attack. If they are left unchecked,...

How to Test for MITM Attacks and Strengthen Network Security.
Risks & Threats October 11, 2024
How To Test MITM Attacks And  Protect Networks

A man-in-the-middle (MITM) attack is a highly effective type of cyber attack that involves a hacker infiltrating a private network by impersonating a rogue access point and acquiring login credentials....

Wireless Security Explained: A Complete Guide to Wi-Fi Protection
Wi-Fi & Wired Security September 26, 2024
A Complete Guide To Wi-Fi Security

In the modern world, it seems as though it would be nearly impossible to function without access to the wireless internet. People everywhere rely on Wi-Fi for everything from entertainment...

Wi-Fi Security Made Easy: 8 Hacks and Effective Preventive Measure
Risks & Threats September 24, 2024
8 WiFi Hacks: How They Work and Preventive Measures

Our lives now wouldn’t be the same without an internet connection, and WiFi networks give us quick and easy access. Nonetheless, hackers find WiFi networks a desirable target due to...

WPA2 vs 802.1X: Understanding the Key Differences in Wi-Fi Security
Wi-Fi & Wired Security September 24, 2024
WPA2 vs 802.1X: What’s the Difference?

Nowadays, there are numerous methods and types of encryption used to secure networks. Businesses should look beyond using WPA2-PSK, which isn’t secure enough for their needs. It’s easy to get...

Set Up a PKI to Issue Identity-bound Certificates to Devices and Users.
PKI/Certificates September 3, 2024
How to Build and Set Up Your Own PKI

A Managed Public Key Infrastructure (PKI) is a vital part of any comprehensive network security strategy. It allows you to use digital certificates for authentication, a form of credential that’s...

CNA Secures Access. A Reliable Onboarding Solution Makes It Seamless”
Wi-Fi & Wired Security August 29, 2024
What Is Apple Captive Network Assistant?

Maintaining a safe connection is of the utmost importance in the hyper-connected world we live in today, where we use the internet for almost everything. Yet, the security of public...

Monitoring Network Traffic Is Crucial To A Secure Network.
Thought Leadership July 26, 2024
How to Monitor Network Traffic: Best Tips for IT Pros

Network traffic monitoring is essential for IT professionals to protect the company’s environment against potential vulnerabilities. It tracks data movement across different networks, ensures the network operates efficiently and identifies...

EAP-TLS Is The Future of VPN Authentication.
Endpoint & Device Management April 17, 2024
How to Authenticate to VPN with EAP-TLS

In today’s world, VPNs (Virtual Private Networks) are very important for individuals and small and large-scale business owners. However, utilizing a VPN can be tricky due to some common difficulties...

EAP-TLS: The Ultimate Defense Against MITM Attacks
Risks & Threats March 25, 2024
How To Prevent Man-in-the-Middle Attacks

Man-in-the-middle attacks (MITM) or on-path attacks are becoming common and complex. Organizations are putting in a lot of effort to mitigate these risks to no avail. Phishing kits are freely...

The Hidden Dangers of Public Wi-Fi and How to Fix It
Risks & Threats Wi-Fi & Wired Security February 29, 2024
Risk of Public Wi-Fi

Public Wi-Fi is any network other than your home or work network and is commonly found in places such as airports, malls, coffee shops, hotels, and restaurants. It allows users...

The LDAP Security Problem and Its Cloud Solution
Protocols & Standards December 18, 2023
Overview of LDAP For Today’s Cloud Environment

Lightweight Directory Access Protocol (LDAP) is an integral component of digital identity frameworks, providing an open and cross-platform protocol used for directory service authentication. It provides a systematic method for...

LDAP Injections: Why Input Sanitization is Not Enough
Risks & Threats December 6, 2023
LDAP Injection Attacks: Explained

LDAP also known as Lightweight Directory Access Protocol, is an essential utility in network settings that facilitates getting hold of data about organizations, individuals, and resources. LDAP is commonly used...

Why PSKs Fail Against Layer 2 Attacks
Risks & Threats May 5, 2023
Layer 2 Attacks that Defeat PSK Networks

Move away from traditional PSKs to digital certificates and protect your network from Layer 2 attacks. Know more here!

Solving the “Certificate Signed by Unknown Authority” Problem
PKI/Certificates May 3, 2023
How to Fix the “X.509 Certificate Signed by Unknown Authority” Error Code

X.509 digital certificates are a fantastic way to encrypt communication and authenticate into systems, but they require a little more infrastructure to support than your typical username and password credentials....

From Wi-Fi to Cloud: Certificates Are the Bridge to Zero Trust
Risks & Threats April 25, 2023
Why You Should Protect Your Local Area Network, Even if You’re Cloud-Based

Ensuring the security and integrity of a business’s data and network infrastructure is of utmost importance, and thus safeguarding the local network is imperative. The Wi-Fi network serves as the...

Why Passwordless Is the Future of Secure Access
Thought Leadership March 31, 2023
Passwordless Authentication: Explained

Do you want to move to effective Passwordless authentication solutions? Read to find out how a robust passwordless solution can enhance your network's security.

Azure AD Certificate-Based Auth: The Next Step Beyond MFA
Web App Access March 29, 2023
Securely Eliminate MFA with Azure AD CBA

Hackers acquired the personal data of over 37 million T-Mobile users, including names, dates of birth, Social Security numbers, and driver’s license information, in a recent incident that featured a...

FreeRADIUS vs. JumpCloud: the pros, the cons, and the smarter alternative
RADIUS September 28, 2022
FreeRADIUS vs. Jumpcloud

As technology progresses, hackers have constantly upgraded their modes of attack, which include social engineering techniques to compromise the network space of an organization. Here’s a recent incident of a...

Secure access starts with the right RADIUS choice.
RADIUS February 1, 2022
Foxpass RADIUS vs. Jumpcloud RaaS

Network authentication has evolved in lockstep with the development of software over the years. The networking protocols considered secure just a few years back have not withstood the test of...

Your next login could be password-free.
PKI/Certificates September 21, 2021
Can PKI Replace Passwords?

There is a new trend that’s taking the IT world by storm: Passwordless Authentication. NordPass estimates that the average user has between 70 and 80 passwords. That’s why people so...

Secure Wi-Fi starts with the right setup.
Integrations July 13, 2021
Is Okta A RADIUS Server?

A RADIUS server operates through connecting to a central database to inform who is allowed to connect to your network. It is a simple and easy-to-configure authentication solution that cannot...

Ensure safe and reliable connectivity for every student.
K-12 Schools June 7, 2021
Top 4 Network Security Tips for Returning to School

The rapid and unexpected transition to remote learning led many schools to scramble for solutions to a new teaching experience. This led to many schools being forced to stretch their...

The Right Authentication Protocol for Simplified Identity Management.
Protocols & Standards May 4, 2021
Comparing: OAuth, OpenID Connect, and SAML

Properly protecting a network requires administrators to make numerous decisions about their security. Knowing what protocol or system to implement at what stage is paramount to network safety. With Cybercrime...

One key, total access, zero hassle
Protocols & Standards April 13, 2021
Everything You Need to Know About FIDO2

Security Keys are a method of authentication that is becoming increasingly more commonplace due to the additional layer of security they provide. They are a versatile security component that can...

Smart Wi-Fi security for modern classrooms.
K-12 Schools March 24, 2021
Setting up Secure BYOD Wi-Fi for K-12 Students

The days of getting in trouble for bringing technology into class are long gone. Many school districts actually rely on students to bring their own devices in order to incorporate...

Modern Wi-Fi, simplified for every network.
Protocols & Standards March 24, 2021
How To Use Google Wi-Fi Without Active Directory and NPS?

While technology changes rapidly, one constant is the use of Google and its spread across all facets of business technology. But how people connect to Google services and how they...

Secure VPN access with 802.1X authentication.
Protocols & Standards March 2, 2021
How to Secure 802.1X for Remote Workers

Though remote work wasn’t started by the Covid-19 pandemic, it has increased drastically to the point that working from home will be commonplace for many workers. Unfortunately that leaves organizations...

Why OAuth alone can’t secure user identities.
Protocols & Standards January 19, 2021
Top 3 Pitfalls of Authenticating with OAuth

What is OAuth? Let’s demystify OAuth by starting with a definition. At its core, OAuth provides clients secure access to a server’s resources on behalf of a resource owner. OAuth...

Take control of your network’s trust without the guesswork.
PKI/Certificates January 7, 2021
Managing an Internal CA

When considering the failures of credential-based authentication, it’s no surprise that many security-conscious organizations have been upgrading to certificates for authentication. One of the benefits of certificates is the flexibility...

Cyber threats evolve; MSPs must adapt.
Service Providers October 30, 2020
Top 3 Cybersecurity Concerns for MSPs

Managed service providers (MSPs) have been the focal point of a series of attacks that are starting to draw attention from the public. A study conducted by Vanson Bourne surveyed...

Tamper-Proof Security at the Chip Level
Protocols & Standards October 20, 2020
What is a TPM?

A TPM, also known as a Trusted Platform Module, is an international standard for a secure cryptoprocessor and is a chip found on the computer’s motherboard. The function of a...

Shared Passwords, Shared Risk
Thought Leadership July 9, 2020
The Importance of Authentication Security

Authentication acts as the first line of defense to allow access to valuable data only to those who are approved by the organization. Many organizations recognize this and utilize Multi-Factor...

AD CS + SecureW2 = Fast, Scalable Wi-Fi Security
Protocols & Standards June 29, 2020
Enabling 802.1x with AD CS

Keeping your network secure from unwanted intruders is increasingly difficult with the advancements in technology. It’s relatively easy for malicious actors to obtain network access and steal all the data...

35% of Exploits Are MITM—Are You Safe?
Risks & Threats June 1, 2020
Man-in-the-Middle (MITM) Attacks: Explained

If you’ve ever watched this scene from Spongebob Squarepants, then you have a basic understanding of a man-in-the-middle (MITM) attack. According to UPS Capital, cyber attacks cost small businesses an...

Certificates for Wi-Fi, Replacing Passwords Now
PKI/Certificates March 23, 2020
Top 4 Managed PKI Use Cases

A Managed PKI is a vital part of any comprehensive network security strategy. It allows you to use digital certificates for authentication, a form of credential that’s much more secure...

SHA-1 Is Broken—It’s Time to Upgrade
Protocols & Standards March 23, 2020
It’s Time For SHA-1 Hash To End

SHA-1 is a commonly used cryptographic hash algorithm that has been used for nearly 2 decades to secure online communications. It was originally designed for government use, but an exploit...

Credentials Alone Are Easy Prey
Risks & Threats March 19, 2020
Phishing Scams Are Now Capitalizing on Coronavirus

COVID-19, better known as the Coronavirus, is spreading throughout the world right now and has a lot of people concerned. This has led to scammers incorporating the virus into their...

Automate, Validate, Secure: Certificate-Based MFA
PKI/Certificates January 3, 2020
Stronger Multi-Factor Authentication With Certificates

It’s widely held knowledge that using a single factor for authentication to wireless networks is less than secure and easily exploited by hackers. According to IBM’s X-Force Threat Intelligence Index,...

SMBs can deploy enterprise-grade MDM security in minutes with certificate-based authentication
SMB November 27, 2018
Introducing an MDM Solution for SMBs

A common trend for SMBs seen across many industries is opting into a MDM infrastructure to replace or supplement a BYOD policy. For many organizations, a MDM system offers a...

SMBs face phishing, stolen passwords, and Wi-Fi hacks. Stop credential theft before it starts.
SMB November 26, 2018
Credential Theft Threats Facing SMBs

Data and credential theft have become an increasingly prevalent concern for SMBs as more attackers choose to target them. It’s common to hear about large scale hacks, such as Target,...