Data Bites

RADIUS security news and updates from the Cloud RADIUS team.

How To Set Up Ubiquiti Unifi For RADIUS Authentication?

RADIUS (Remote Authentication Dial-In User Service) allows users to connect to a wireless network and identify themselves to the network to access their work resources. It’s a network protocol supports AAA( Authentication, Authorization, and Accounting) and provides security, control, and thorough monitoring of your network’s users and devices, offering administrators better network management. The 802.1X […]

Read Story

Cloud-Based RADIUS Server with Azure Integration

Your IDP is vital to any Zero Trust Network Architecture. Learn how a cloud-based RADIUS server can integrate with your Azure.

Read Story

How to Setup a Windows RADIUS Server

The secret is out: pre-shared key-backed networks do not provide enough defense against hackers and data thieves. A survey found that 74% of IT decision-makers whose data had been breached in the past say the hack involved privileged access credential abuse. Even complex credentials are susceptible to over-the-air credential theft. Backing your network with a […]

Read Story

How To Auto Deploy RADIUS WiFi With Group Policy

Imagine entering your office and instantly connecting to a secure WiFi network without entering passwords or configuring security settings. Sounds like magic, right? That’s the beauty of RADIUS and Group Policy functioning together. RADIUS, short for Remote Authentication Dial-In User Service, serves as a gatekeeper, ensuring that only authorized users can access your network. Group […]

Read Story

Blast-RADIUS Vulnerability: What is it and am I affected?

What is Blast-RADIUS? As the name suggests it’s a vulnerability targeting the age-old and widely used RADIUS protocol. With CVE code 2024-3596, this new vulnerability aims to abuse the MD5 hash to modify a valid Access-Reject response to Access-Accept, thus, granting network access to an illegitimate user.   The vulnerability is still awaiting a detailed analysis […]

Read Story

A High-Level Analysis of Various Encryption Algorithms Used in Wireless Security

Data encryption encodes data, making it hidden and inaccessible to an unauthorized user. Encryption is more common than we think. Data is transmitted as ciphertext whenever we access our email or applications, log in to a website, or connect to a VPN. This protects data from an interceptor who could gain access to a network […]

Read Story