MS-CHAP is dead While MS-CHAP has been used since 1998, it uses DES encryption which was deprecated in 2002. Attacks on MS-CHAP itself have been known since 2006, and those attacks have only gotten better over time. ... Network Security Best Practices Network Security Protocols
BlastRADIUS Neutralized: Experts at InkBridge Networks Provide Fix for Critical Network Vulnerability FOR IMMEDIATE RELEASE Jana Sedivy InkBridge Networks JSedivy@InkBridgeNetworks.com inkbridgenetworks.com [OTTAWA, CANADA]:The RADIUS experts at InkBridge Networks have developed a blueprint to resolve... Security Threats and Vulnerabilities
NetworkRADIUS Rebrands as InkBridge Networks, Expands to Support Broader Network Challenges for Enterprises FOR IMMEDIATE RELEASE Jana Sedivy InkBridge Networks JSedivy@InkBridgeNetworks.com inkbridgenetworks.com [OTTAWA, CANADA]: NetworkRADIUS is rebranding as InkBridge Networks, and expanding its focus as...
BlastRADIUS Vulnerability Threatens Corporate Networks and Cloud – InkBridge Networks Guides Organizations Through the Fix FOR IMMEDIATE RELEASE Jana Sedivy InkBridge Networks JSedivy@InkBridgeNetworks.com inkbridgenetworks.com [OTTAWA, CANADA]: The BlastRADIUS vulnerability announced July 9 by cybersecurity researchers i... Security Threats and Vulnerabilities
Network authentication protocols: compatibility between systems and methods In many network configurations, there will be some transactions for which the RADIUS server will not perform the authentication itself, but simply pass credentials to a third-party system and rely on ... Network Security Protocols
Authentication: Is it really you? RADIUS security is composed of three components: authentication, authorization, and accounting. These three links in the RADIUS security chain are often referred to by their acronym, “AAA”. The first ... Network Security Protocols
802.1X FreeRADIUS setup Undertaking 802.1X setup is a daunting experience for many organizations. There are detailed requirements on end-user PCs, switches, servers, certificates, and more. If any of these requirements are n... Network Security Best Practices
FreeRADIUS v3.0.x packages now available Release packages are available for Debian, Ubuntu and CentOS 7. These packages are from the official “3.0.19” release, and will track all new versions of FreeRADIUS. The release packages are also inte... Network Security Protocols
RADIUS standards compliance We believe that standards compliance is critical for customer satisfaction and vendor interoperability. Systems that follow standards have known, documented behaviour, so there are few surprises. Our ... Network Security Protocols
How to configure a RADIUS server Even though clients may prefer to configure their own system, some clients are unsure of how to configure a RADIUS server. Although the process can be complex, clients can learn how to setup a RADIUS ... Network Security Best Practices
Client Case Study: 802.1X Setup One of our clients had customer-visible issues in their 802.1X deployment. We tracked the problem down to firmware issues and worked with multiple vendors to fix the issues and more. This meant that o... Network Security Best Practices
Client Case Study: RADIUS SQL We were called in to help our client who had database performance issues with their custom schema and queries. We made updates to the database tables and indices and reconfigured the RADIUS server app... Network Security Best Practices