Exposed: National Public Data breach makes a nation’s secrets public The hacking of 270 million social security numbers from National Public Data reinforces the best practice for personal data: always encrypt PII. The cat is out of the bag for National Public Data. In ... Network Security Best Practices
TP-Link Investigation Highlights IT Hardware Risks Calls for an investigation into routers from TP-Link highlight the security risk of using compromised hardware as part of a corporate network. What is the TP-Link controversy? Concerns that the Peopl... Security Threats and Vulnerabilities
How to customize an OEM instance of FreeRADIUS As the most popular RADIUS server in the world, FreeRADIUS is used by many hardware vendors. They ship their products with FreeRADIUS as an embedded or “OEM” product. It is common for them to need som... Network Security Protocols
Expert Advice Beats Internet Wisdom: What Not To Do About BlastRADIUS There’s a lot of misinformation circulating about the BlastRADIUS vulnerability. For us, as RADIUS experts, it’s a depressing reminder of how little people understand about this foundational protocol ... Network Security Best Practices Network Security Protocols Security Threats and Vulnerabilities
How authentication protocols work Choosing an authentication protocol is one of the most important decisions when designing a RADIUS ecosystem. There are a variety of authentication protocols to choose from, each with their own set of... Network Security Protocols
PAP vs CHAP: A complete security comparison One of the most common questions about RADIUS security asks “Is PAP secure?” The usual answer is “no”, which is (in our opinion) simply wrong. A better answer is “Here’s a comparison of PAP and CHAP, ... Network Security Best Practices Network Security Protocols
Is PAP secure? A complete analysis of PAP authentication security A common misconception is that PAP is less secure than other authentication protocols such as CHAP, MS-CHAP, or EAP-MSCHAP(v2). This perception arises because of a misunderstanding of how PAP is actua... Network Security Best Practices Network Security Protocols
NetworkRADIUS Rebrands as InkBridge Networks, Expands to Support Broader Network Challenges for Enterprises FOR IMMEDIATE RELEASE Jana Sedivy InkBridge Networks JSedivy@InkBridgeNetworks.com inkbridgenetworks.com [OTTAWA, CANADA]: NetworkRADIUS is rebranding as InkBridge Networks, and expanding its focus as...
FreeRADIUS v3.0.x packages now available Release packages are available for Debian, Ubuntu and CentOS 7. These packages are from the official “3.0.19” release, and will track all new versions of FreeRADIUS. The release packages are also inte... Network Security Protocols
RADIUS standards compliance: from RFC to WiFi Alliance We believe that standards compliance is critical for customer satisfaction and vendor interoperability. Systems that follow standards have known, documented behaviour, so there are few surprises. Our ... Network Security Protocols
LDAP and Active Directory LDAP databases are most typicallyused by enterprises to store employee credentials, telephone numbers, etc. Some ISPs also use LDAP, but it's not as wide spread as the ISP use of SQL. The common imple... Network Security Best Practices
Why use a RADIUS server? What is RADIUS and why do I care? We admit it. Most people haven't heard of RADIUS, and don't know what it is. That's fine. This blog post explains why every ISP is using RADIUS, and why an enterprise...