IoT devices must be secured to protect the network

Certificate Security for IoT Devices

Internet of Things (IoT) devices have been a rapidly growing industry trend that can provide invaluable and unique data to many organizations. While most devices are designed to maximize the efficiency of data distribution, they often leave security by the ... Read More The post Certificate Security for IoT Devices ... Read More
Image result for what is a public pki"

Risks of a Public Certificate Authority

Recently, cybercriminals have begun targeting public Certificate Authorities (CA) to obtain legitimate certificates and then sell them on the black market. Because these are verified and signed certificates obtained by unjust means, it can be exceedingly difficult to identify them. ... Read More The post Risks of a Public Certificate ... Read More
This is how hackers hack you using simple social engineering

Stronger Multi-Factor Authentication With Certificates

It’s widely held knowledge that using a single factor for authentication to wireless networks is less than secure and easily exploited by hackers. Many organizations recognize this and utilize Multi-Factor Authentication (MFA) to an extra layer of protection. Each additional ... Read More The post Stronger Multi-Factor Authentication With Certificates ... Read More
detailed view of EAP-TLS authentication process

WPA2-Enterprise Authentication Protocols Comparison

Securely authenticating network users is a fundamental aspect of network security and is the source of significant challenges for many network administrators. The network authentication method is one of the first lines of defense that protect users and the network ... Read More The post WPA2-Enterprise Authentication Protocols Comparison appeared ... Read More

Cloud vs. On-Site RADIUS: The Authentication Confrontation

A requirement for all WPA2-Enterprise networks is the use of a RADIUS server. A vital part of the network, the function of a RADIUS is to authenticate the user and their device and authorize them for network access. The authorization ... Read More The post Cloud vs. On-Site RADIUS: The ... Read More

How To Trust Your Cybersecurity

The post How To Trust Your Cybersecurity appeared first on SecureW2 ... Read More
EAP-TTLS/PAP Authentication Protocol Is Not Secure

EAP-TTLS/PAP Authentication Protocol Is Not Secure

When designing a new network, there are countless features to consider that have a significant impact on the organization at large. Few functions of the network impact the users more than the authentication method chosen by decision makers. If an ... Read More The post EAP-TTLS/PAP Authentication Protocol Is Not ... Read More

Efficient Device Onboarding for Higher Education

The post Efficient Device Onboarding for Higher Education appeared first on SecureW2 ... Read More
Equifax Breach: What Happened

Equifax’s Story: The Risks of Lax Security

The post Equifax’s Story: The Risks of Lax Security appeared first on SecureW2 ... Read More
Loading...