Mobile World Congress 2026: what ISPs and network operators should take away AI dominated the conversation at Mobile World Congress 2026, but the more interesting story was about who controls the infrastructure it runs on. I came back from Mobile World Congress 2026 in Barcelo... Industry Insights and Trends
Build what you need Your authentication system goes down because the licensing server is unreachable. This happens more than you'd think. ByAlan DeKok, CEO, InkBridge Networks Your authentication server goes down during ... Network Security Best Practices Network Security Protocols
AI intrusion detection AI can spot network intruders brilliantly, but it can also create more security disasters than it's preventing. By Jana Sedivy, VP of Customer Experience and Product Yes, AI is transforming network se... Industry Insights and Trends Network Security Protocols
Fiber vs fixed wireless: 6 predictions for ISPs in 2026 The fiber vs fixed wireless debate is evolving faster than most ISPs anticipated. Fixed wireless access is no longer just the rural backup plan. Consolidation isn't slowing down. And the speed that so... Industry Insights and Trends Network Security Protocols
Enterprise Wi-Fi standards and authentication From Paris to Amsterdam, we spent October at the forefront of enterprise Wi-Fi standards development - here's what carriers and enterprises need to know about the future of network authentication. T... Industry Insights and Trends Network Security Protocols
Cisco ISE alternatives: 2026 comparison & buyer's guide Compare pricing, features, and migration paths for top network access control alternatives to Cisco ISE. "We have 50,000 users and the licensing alone is an enormous cost." This is the conversation s... Network Security Best Practices Network Security Protocols
Stop looking for FreeRADIUS alternatives Afraid of FreeRADIUS? If worries about support, scalability, and security have you looking for alternatives, FreeRADIUS creator Alan DeKok explains why those fears are unfounded. After 25+ years mai... Network Security Protocols
The RADIUS protocol: How it works and why it's secure Learn how security-by-design improvements have transformed RADIUS into a more secure protocol than the expensive platforms built on top of it. “Is RADIUS secure?” is one of the most common questions n... Network Security Best Practices Network Security Protocols
RADIUS Active Directory This comprehensive guide covers everything you need to know about RADIUS Active Directory integration, from basic concepts to enterprise-scale implementations. Microsoft Active Directory has long been... Network Security Best Practices
Human-centred security: Designing systems for how people actually work The future of cybersecurity lies not in more complex systems but in better integration between human psychology and technical solutions. By designing security solutions that work with human nature rat... Network Security Best Practices Security Threats and Vulnerabilities
Steel-Belted RADIUS Server End-of-Life: What You Need to Know Now Learn why Steel-Belted RADIUS server's end-of-life status puts your network at risk and how to plan your migration to a secure, future-proof authentication solution. If you're still running Steel-Belt... Network Security Best Practices Security Threats and Vulnerabilities
Client Case Study: Enterprise network security Global enterprises could lose millions of dollars in minutes without ironclad network security. Learn how industry leaders—including Goldman Sachs, Siemens, and a national US bank—protect critical dat... Network Security Best Practices