Is RADIUS secure? Learn how security-by-design improvements have transformed RADIUS into a more secure protocol than the expensive platforms built on top of it. “Is RADIUS secure?” is one of the most common questions n... Network Security Best Practices Network Security Protocols
IETF 124, Montreal QC, Canada Global RADIUS standards taking shape in Canada Event Details Date: Saturday, November 1 – Friday, November 7, 2025 RADEXT session: Friday, November 7, 2:30–4:30 pm EST Location: Fairmont The Queen Elizabeth, 900 René-Lévesque Blvd W, Montreal, Que...
Human-centred security: Designing systems for how people actually work The future of cybersecurity lies not in more complex systems but in better integration between human psychology and technical solutions. By designing security solutions that work with human nature rat... Network Security Best Practices Security Threats and Vulnerabilities
It’s Finally Time to Replace NTLM With Microsoft deprecating MS-CHAP and NTLM, it’s time for enterprise networks to switch to a more secure authentication method: TTLS. Microsoft is finally deprecating its 30-year-old MS-CHAP and NTLM... Network Security Protocols
Steel-Belted RADIUS Server End-of-Life: What You Need to Know Now Learn why Steel-Belted RADIUS server's end-of-life status puts your network at risk and how to plan your migration to a secure, future-proof authentication solution. If you're still running Steel-Belt... Network Security Best Practices Security Threats and Vulnerabilities
We toppled a $500 million industry with free software Why your "enterprise-grade" million-dollar solution is getting outmaneuvered by free software running on commodity hardware by Alan DeKok, CEO Twenty-five years ago, I started building FreeRADIUS in m... Network Security Best Practices Network Security Protocols
Client Case Study: Enterprise network security Global enterprises could lose millions of dollars in minutes without ironclad network security. Learn how industry leaders—including Goldman Sachs, Siemens, and a national US bank—protect critical dat... Network Security Best Practices
Client Case Study: Network authentication at scale 65% fewer authentication failures. 40% drop in support tickets. How InkBridge Networks is helping educational institutions by transforming their eduroam experience with protocol-level fixes. The scale... Network Security Best Practices
The unique challenges of campus networks By Terry Burton, Director of Security Table of contents What is a campus area network? 7characteristics of campus networks Universities function as their own ISPs Massive user community with constant ... Network Security Best Practices Network Security Protocols
AI in network management: A hard look at real-world limitations Today, AI sits at the peak of the hype cycle, but AI in network management faces fundamental challenges that the industry seems reluctant to acknowledge. While it's revolutionizing certain fields, net... Network Security Best Practices
Virtual servers with FreeRADIUS Virtual servers provide a powerful way to define unique policies for different traffic sources . When policy rules for each traffic source are defined in their own separate configuration file, it’s a ...
FreeRADIUS hardware requirements A common question for people installing the server is “what are the hardware requirements for FreeRADIUS?” The answer is both simpler, and more complex than you would think. The performance of a RADIU... Network Security Best Practices