Is RADIUS secure? Learn how security-by-design improvements have transformed RADIUS into a more secure protocol than the expensive platforms built on top of it. “Is RADIUS secure?” is one of the most common questions n... Network Security Best Practices Network Security Protocols
30-year RADIUS design flaw fixed at the IETF Montreal 124 hackathon For the past 30 years, RADIUS has had a fundamental problem: in some cases, servers must discard well-formed, authentic packets from known clients. When something goes wrong in a multi-hop proxy envir...
IETF 124, Montreal QC, Canada Global RADIUS standards taking shape in Canada Event Details Date: Saturday, November 1 – Friday, November 7, 2025 RADEXT session: Friday, November 7, 2:30–4:30 pm EST Location: Fairmont The Queen Elizabeth, 900 René-Lévesque Blvd W, Montreal, Que...
From nuclear physics to open-source monetization A nuclear physicist's "hobby project" now authenticates half the internet and generates millions in revenue. Here's how he monetized what everyone said was impossible. Listen to the full conversatio... Network Security Best Practices
Steel-Belted RADIUS Server End-of-Life: What You Need to Know Now Learn why Steel-Belted RADIUS server's end-of-life status puts your network at risk and how to plan your migration to a secure, future-proof authentication solution. If you're still running Steel-Belt... Network Security Best Practices Security Threats and Vulnerabilities
Client Case Study: Network authentication at scale 65% fewer authentication failures. 40% drop in support tickets. How InkBridge Networks is helping educational institutions by transforming their eduroam experience with protocol-level fixes. The scale... Network Security Best Practices
WiFi spoofing for fun and profit You can spend as much time as you want securing your RADIUS server infrastructure and the rest of your network. But are you really secureagainst WiFi spoofing attacks? In this article, we show just ho... Network Security Best Practices Security Threats and Vulnerabilities
Email addresses are primary user identifiers? There is a lot of advice out there that email addresses are not identifiers . Even Internet2 has a document explaining why email is not an appropriate user identifier . What does this mean for RADIUS,... Network Security Best Practices
IETF Bangkok 122 recap: What we're doing to advance RADIUS standards I've recently returned from IETF Bangkok, the Internet Engineering Task Force (IETF) 122 meeting, where I spent a week working with implementers, operators, and standards authors who are defining the ... Network Security Protocols
Using FreeRADIUS with FIPS mode on compliant systems In order to create more secure systems, standards such as Federal Information Processing Standard 140-2 ( FIPS-140) are being more widely used. The FIPS standard provides for limits on which cryptogra... Network Security Protocols
Disaster-proof your network critical infrastructure If you live in an earthquake zone, it’s important to engineer buildings to survive an earthquake. You don’t know when an earthquake will happen, or where exactly, or how big it’s going to be, but you ... Network Security Best Practices
Network design for multi-site RADIUS systems Some organizations and network operators such as ISPs can use a central RADIUS service for all of their RADIUS needs. This configuration is possible when there are a small number of users, or system l... Network Security Best Practices