SSL vs. TLS Certificates
One of the most important security precautions for any customer-facing organization is to ensure data sent between the two parties is protected from outside attacks. Without data integrity, customers or data recipients cannot feel secure because their information could be ... Read More The post SSL vs. TLS Certificates appeared ... Read More
Problems Facing IT Departments
Jake Ludin | | Authentication, certificate authentication, Cloud Security, consumer protection, helpdesk, IT, support tickets, Tech Trends
No one can deny that the IT department is tasked with monumentally important functions. Without an efficient and secure network, nearly every organization would fall apart. IT has to find cost effective methods to meet the needs of an organization’s ... Read More The post Problems Facing IT Departments appeared ... Read More
SAML vs. LDAP, Access Protocol Comparison
Both SAML and LDAP are access protocols commonly used in a wide variety of organizations, but they have different use cases and areas of effectiveness. They’re both used to facilitate RADIUS communication to other parts of the PKI for authentication, ... Read More The post SAML vs. LDAP, Access Protocol ... Read More
Multi-Factor Authentication for Okta VPN
When it comes to authentication security, one of the simplest upgrades you can make that will drastically improve your network’s safety is to implement Multi-Factor Authentication (MFA). Simply put, MFA is any security system that requires multiple forms of identification ... Read More The post Multi-Factor Authentication for Okta VPN ... Read More
User Lookup With Certificate-Based Authentication
Jake Ludin | | certificate authentication, cloud RADIUS, consumer protection, CRL, dynamic radius, education, User Lookup
Traditionally, the process of authenticating certificates for network access is independent of the user directory. And in a normally-functioning network environment, this is perfectly acceptable. Certificate-based authentication is ironclad and protects the network from unauthorized entry. Only in very rare, ... Read More The post User Lookup With Certificate-Based Authentication ... Read More
Can I Set Up Microsoft NPS in the Cloud?
Jake Ludin | | cloud RADIUS, EAP Authentication, education, NPS, server certificate validation, server certificates, Tech Trends
Microsoft’s Network Policy Server (NPS) is a AAA RADIUS server used for a number of different types of network connections. It can be used for wireless authentication, VPN connections, dial-up, and more. But as organizations continue to move to cloud-based ... Read More The post Can I Set Up Microsoft ... Read More
A Guide to Server Certificates
Jake Ludin | | certificate trust chain, education, HTTPS, server certificate validation, server certificates, SSL Certificates, web authentication
What are Server Certificates? Server certificates are an extremely recurrent piece of software that the average network user has no knowledge of but encounters every time the user accesses the internet. To any person within the technology industry, they are ... Read More The post A Guide to Server Certificates ... Read More
Are Passwords Secure?
Jake Ludin | | certificate-based authentication, credential theft, credential-based authentication, education, MFA, Password Security, Security threats
Credential-based authentication is the method nearly all network users are used to and has been a common tool for decades. But unlike other decades-old technology, passwords have not been phased out of regular use. Now more than ever, passwords pose ... Read More The post Are Passwords Secure? appeared first ... Read More
The Importance of Authentication Security
Jake Ludin | | 802.1x authentication, authentication security, certificate-based authentication, credential-based authentication, Tech Trends
Authentication acts as the gateway to allow access to valuable data only to those who are approved by the organization. But bad actors seem to be a step ahead of network security professionals. Many security professionals experience burnout in their ... Read More The post The Importance of Authentication Security ... Read More
Installing S/MIME Certificates with SecureW2
Ensuring the security and privacy of email messages is paramount to an organization’s ability to function. Vital information and data are shared over email every day, and the opportunity for bad actors to infiltrate a network through email-based methods is ... Read More The post Installing S/MIME Certificates with SecureW2 ... Read More

