eap and peap

Can I Use PEAP-MSCHAPv2 and EAP-TLS Authentication on My Network?

The short answer is: Yes. Organizations that are interested in moving from the unsecure PEAP-MSCHAPv2 protocol to the superior EAP-TLS protocol might be worried about huge infrastructure overhaul or the network downtime it might entail. We’ve helped many organizations over ... Read More The post Can I Use PEAP-MSCHAPv2 and ... Read More
man-in-the-middle-attack

Without Server Certificate Validation, WPA2-Enterprise Isn’t Secure

The post Without Server Certificate Validation, WPA2-Enterprise Isn’t Secure appeared first on SecureW2 ... Read More
yubikey certificate

Using Digital Certificates on Yubikey

Yubikeys are an incredibly secure method of protecting yourself from data theft, but you’re probably not using them to their full potential. Natively, Yubikeys only support credential-based authentication through keypairs and one-time passwords. However, SecureW2 has developed an industry-first solution ... Read More The post Using Digital Certificates on Yubikey ... Read More

The Risks of Pre-Shared Keys (PSKs)

It’s no secret that pre-shared keys are insecure, especially compared to digital certificates. However, with many services being moved to the cloud, fewer and fewer resources are being stored in-network. Shared files aren’t stored on an intranet these days, they’re ... Read More The post The Risks of Pre-Shared Keys ... Read More
Public key cryptography - Diffie-Hellman Key Exchange (full version)

What is Public Key Cryptography?

Public key cryptography, a synonym for asymmetric cryptography, is a clever cryptographic system that allows two parties to exchange encrypted information publicly without worry of interception. Many cryptographic systems are symmetric. Two or more parties share a private key, then ... Read More The post What is Public Key Cryptography? ... Read More
yubikey jamf login

Configuring Yubikey Desktop Login on Jamf-Managed Devices

Yubikeys represent an exciting opportunity to merge two features that are often at odds: security and convenience. Many organizations have purchased Yubikeys and distributed them to their employees for that extra layer of physical security. They’re commonly used to securely ... Read More The post Configuring Yubikey Desktop Login on ... Read More
Public vs Private Certificate Authority

Public vs Private Certificate Authority

What’s a Certificate Authority (CA)? A certificate authority is an institution that distributes digital certificates. Certificate issuance is a critical part of securing interactions on the internet because certificates cryptographically tie an identity to a public key. Certificates are commonly ... Read More The post Public vs Private Certificate Authority ... Read More
Unlock the Potential of Security Keys

Unlock the Potential of Security Keys

Security keys, also called hardware security keys, are a method of authentication that offers an additional layer of hardened security. They can be used to login to desktops, Wi-Fi, and be integrated into the sign-in process of many popular websites ... Read More The post Unlock the Potential of Security ... Read More