Is RADIUS secure? Learn how security-by-design improvements have transformed RADIUS into a more secure protocol than the expensive platforms built on top of it. “Is RADIUS secure?” is one of the most common questions n... Network Security Best Practices Network Security Protocols
30-year RADIUS design flaw fixed at the IETF Montreal 124 hackathon For the past 30 years, RADIUS has had a fundamental problem: in some cases, servers must discard well-formed, authentic packets from known clients. When something goes wrong in a multi-hop proxy envir...
Human-centred security: Designing systems for how people actually work The future of cybersecurity lies not in more complex systems but in better integration between human psychology and technical solutions. By designing security solutions that work with human nature rat... Network Security Best Practices Security Threats and Vulnerabilities
It’s Finally Time to Replace NTLM With Microsoft deprecating MS-CHAP and NTLM, it’s time for enterprise networks to switch to a more secure authentication method: TTLS. Microsoft is finally deprecating its 30-year-old MS-CHAP and NTLM... Network Security Protocols
Steel-Belted RADIUS Server End-of-Life: What You Need to Know Now Learn why Steel-Belted RADIUS server's end-of-life status puts your network at risk and how to plan your migration to a secure, future-proof authentication solution. If you're still running Steel-Belt... Network Security Best Practices Security Threats and Vulnerabilities
Client Case Study: Network authentication at scale 65% fewer authentication failures. 40% drop in support tickets. How InkBridge Networks is helping educational institutions by transforming their eduroam experience with protocol-level fixes. The scale... Network Security Best Practices
The unique challenges of campus networks By Terry Burton, Director of Security Table of contents What is a campus area network? 7characteristics of campus networks Universities function as their own ISPs Massive user community with constant ... Network Security Best Practices Network Security Protocols
WiFi spoofing for fun and profit You can spend as much time as you want securing your RADIUS server infrastructure and the rest of your network. But are you really secureagainst WiFi spoofing attacks? In this article, we show just ho... Network Security Best Practices Security Threats and Vulnerabilities
Email addresses are primary user identifiers? There is a lot of advice out there that email addresses are not identifiers . Even Internet2 has a document explaining why email is not an appropriate user identifier . What does this mean for RADIUS,... Network Security Best Practices
IETF Bangkok 122 recap: What we're doing to advance RADIUS standards I've recently returned from IETF Bangkok, the Internet Engineering Task Force (IETF) 122 meeting, where I spent a week working with implementers, operators, and standards authors who are defining the ... Network Security Protocols
RADIUS Insecurity RADIUS is almost thirty years old, and uses cryptography based on MD5. Given that MD5 has been broken for over a decade, what are the implications for RADIUS? Why is RADIUS still using MD5? RADIUS sti... Network Security Protocols
Inaugural RADIUS Conference Set for March 12–13, 2025 FOR IMMEDIATE RELEASE Jana Sedivy InkBridge Networks jana.sedivy@inkbridgenetworks.com InkBridgeNetworks.com Inaugural RADIUS Conference Set for March 12–13, 2025 The first-ever global RADIUS conferen... Network Security Protocols