Why you should separate historical data from live data ISPs and telecoms are often legally required to keep user sessiondata for long periods of time. However, keeping these records can result in enormous databases tables which significantlyaffect the per... Network Security Best Practices Network Security Protocols
Inaugural RADIUS Conference Set for March 12–13, 2025 FOR IMMEDIATE RELEASE Jana Sedivy InkBridge Networks jana.sedivy@inkbridgenetworks.com InkBridgeNetworks.com Inaugural RADIUS Conference Set for March 12–13, 2025 The first-ever global RADIUS conferen... Network Security Protocols
A win for network and information security: InkBridge Networks awarded for fast, safe, reliable network access FOR IMMEDIATE RELEASE Jana Sedivy InkBridge Networks jana.sedivy@inkbridgenetworks.com InkBridgeNetworks.com A win for network and information security: InkBridge Networks awarded for fast, safe, relia... Network Security Protocols
Authorized users only: Why use RADIUS and 802.1x to control network access? RADIUS can be an alternative to implementing 802.1x for network access control in complex enterprise environments. Controlling which users and what devices are on your network has become significantly... Network Security Best Practices
Press release: Network Authentication Leader InkBridge Networks Names Its Director of Security FOR IMMEDIATE RELEASE Jana Sedivy InkBridge Networks jana.sedivy@inkbridgenetworks.com InkBridgeNetworks.com Network Authentication Leader, InkBridge Networks, Names Its Director of Security As cybert... Network Security Protocols
Making RADIUS More Secure As we’ve previously discussed, there are several insecure elements in RADIUS. We are currently working in the IETF (Internet Engineering Task Force) to close those gaps and improve security for everyo... Network Security Protocols
Client Case Study: RADIUS AAA Policies One of our clients with a support contract had performance issues. We tracked this down to inefficient usage of AAA policies. Having tuned the policies the load on our client’s database dropped by a f... Network Security Best Practices
Exposed: National Public Data breach makes a nation’s secrets public The hacking of 270 million social security numbers from National Public Data reinforces the best practice for personal data: always encrypt PII. The cat is out of the bag for National Public Data. In ... Network Security Best Practices
TP-Link Investigation Highlights IT Hardware Risks Calls for an investigation into routers from TP-Link highlight the security risk of using compromised hardware as part of a corporate network. What is the TP-Link controversy? Concerns that the Peopl... Security Threats and Vulnerabilities
Three Reasons to Protect Your Network Against BlastRADIUS There are mixed feelings in the security community about the urgency to protect networks from the BlastRADIUS vulnerability. Why fix a 30-year-old design flaw that can only be exploited by someone alr... Security Threats and Vulnerabilities
Expert Advice Beats Internet Wisdom: What Not To Do About BlastRADIUS There’s a lot of misinformation circulating about the BlastRADIUS vulnerability. For us, as RADIUS experts, it’s a depressing reminder of how little people understand about this foundational protocol ... Network Security Best Practices Network Security Protocols Security Threats and Vulnerabilities
Big Tech Concentration Made CrowdStrike Update a Catastrophe As we dissect the CrowdStrike outage, we’ll find the human error was multiplied by the concentration in Big Tech, says network security expert Alan DeKok of InkBridge Networks. There will be intense r... Security Threats and Vulnerabilities