Build what you need Your authentication system goes down because the licensing server is unreachable. This happens more than you'd think. ByAlan DeKok, CEO, InkBridge Networks Your authentication server goes down during ... Network Security Best Practices Network Security Protocols
AI intrusion detection AI can spot network intruders brilliantly, but it can also create more security disasters than it's preventing. By Jana Sedivy, VP of Customer Experience and Product Yes, AI is transforming network se... Industry Insights and Trends Network Security Protocols
Fiber vs fixed wireless: 6 predictions for ISPs in 2026 The fiber vs fixed wireless debate is evolving faster than most ISPs anticipated. Fixed wireless access is no longer just the rural backup plan. Consolidation isn't slowing down. And the speed that so... Industry Insights and Trends Network Security Protocols
Enterprise Wi-Fi standards and authentication From Paris to Amsterdam, we spent October at the forefront of enterprise Wi-Fi standards development - here's what carriers and enterprises need to know about the future of network authentication. T... Industry Insights and Trends Network Security Protocols
Cisco ISE alternatives: 2026 comparison & buyer's guide Compare pricing, features, and migration paths for top network access control alternatives to Cisco ISE. "We have 50,000 users and the licensing alone is an enormous cost." This is the conversation s... Network Security Best Practices Network Security Protocols
Stop looking for FreeRADIUS alternatives Afraid of FreeRADIUS? If worries about support, scalability, and security have you looking for alternatives, FreeRADIUS creator Alan DeKok explains why those fears are unfounded. After 25+ years mai... Network Security Protocols
The RADIUS protocol: How it works and why it's secure Learn how security-by-design improvements have transformed RADIUS into a more secure protocol than the expensive platforms built on top of it. “Is RADIUS secure?” is one of the most common questions n... Network Security Best Practices Network Security Protocols
Making RADIUS More Secure As we’ve previously discussed, there are several insecure elements in RADIUS. We are currently working in the IETF (Internet Engineering Task Force) to close those gaps and improve security for everyo... Network Security Protocols