Big Tech Concentration Made CrowdStrike Update a Catastrophe As we dissect the CrowdStrike outage, we’ll find the human error was multiplied by the concentration in Big Tech, says network security expert Alan DeKok of InkBridge Networks. There will be intense r... Security Threats and Vulnerabilities
RADIUS protocol and password compatibility In order for RADIUS authentication to work, user passwords need to be stored in a format that is understood by the authentication protocol used by the client. Unfortunately, not all protocols work wit... Network Security Best Practices Network Security Protocols
How authentication protocols work Choosing an authentication protocol is one of the most important decisions when designing a RADIUS ecosystem. There are a variety of authentication protocols to choose from, each with their own set of... Network Security Protocols
PAP vs CHAP. Is PAP less secure? One of the most common questions about RADIUS security asks “Is PAP secure?” The usual answer is “no”, which is (in our opinion) seriously misleading. A better answer is “Here’s a comparison of PAP an... Network Security Best Practices Network Security Protocols
Is PAP secure? A common misconception is that PAP is less secure than other authentication protocols such as CHAP, MS-CHAP, or EAP-MSCHAP(v2). This perception arises because of a misunderstanding of how PAP is actua... Network Security Best Practices Network Security Protocols
MS-CHAP is dead While MS-CHAP has been used since 1998, it uses DES encryption which was deprecated in 2002. Attacks on MS-CHAP itself have been known since 2006, and those attacks have only gotten better over time. ... Network Security Best Practices Network Security Protocols
Don't "Set it and Forget it" So you decided that whatever you were using for network security wasn’t getting the job done… Either it didn’t scale with the growth in your user base, devices, or network design, or it was hindering ... Network Security Best Practices Network Security Protocols
Accounting: Keeping track of it all We have already looked at authentication and authorization. In this third article, we’ll take a look at the accounting process, the process of monitoring and recording a client’s use of the network, a... Network Security Protocols
Authorization: Authorized personnel only The first article in our series described the authentication process, whereby the RADIUS server prevents unauthorized users from accessing the system. In today’s article, we’ll examine the second link... Network Security Protocols
Authentication: Is it really you? RADIUS security is composed of three components: authentication, authorization, and accounting. These three links in the RADIUS security chain are often referred to by their acronym, “AAA”. The first ... Network Security Protocols
BlastRADIUS Neutralized: Experts at InkBridge Networks Provide Fix for Critical Network Vulnerability [OTTAWA, CANADA]: The RADIUS experts at InkBridge Networks have developed a blueprint to resolve the BlastRADIUS critical network security vulnerability announced on July 9th. This vulnerability in th... Security Threats and Vulnerabilities
NetworkRADIUS Rebrands as InkBridge Networks, Expands to Support Broader Network Challenges for Enterprises [OTTAWA, CANADA]: NetworkRADIUS is rebranding as InkBridge Networks, and expanding its focus as the company evolves to support more broad and complex network challenges for telecoms/ISPs, universities...