Fiber vs fixed wireless: 6 predictions for ISPs in 2026 The fiber vs fixed wireless debate is evolving faster than most ISPs anticipated. Fixed wireless access is no longer just the rural backup plan. Consolidation isn't slowing down. And the speed that so... Industry Insights and Trends Network Security Protocols
Enterprise Wi-Fi standards and authentication From Paris to Amsterdam, we spent October at the forefront of enterprise Wi-Fi standards development - here's what carriers and enterprises need to know about the future of network authentication. T... Industry Insights and Trends Network Security Protocols
Cisco ISE alternatives: 2026 comparison & buyer's guide Compare pricing, features, and migration paths for top network access control alternatives to Cisco ISE. "We have 50,000 users and the licensing alone is an enormous cost." This is the conversation s... Network Security Best Practices Network Security Protocols
InkBridge Networks in 2025 2025 is the year InkBridge Networks launched the world's first RADIUS conference and championed critical standards work, reinforcing our position as the authentication experts the industry turns to wh... Network Security Protocols
Is RADIUS secure? Learn how security-by-design improvements have transformed RADIUS into a more secure protocol than the expensive platforms built on top of it. “Is RADIUS secure?” is one of the most common questions n... Network Security Best Practices Network Security Protocols
IETF Bangkok 122 recap: What we're doing to advance RADIUS standards I've recently returned from IETF Bangkok, the Internet Engineering Task Force (IETF) 122 meeting, where I spent a week working with implementers, operators, and standards authors who are defining the ... Network Security Protocols
Using FreeRADIUS with FIPS mode on compliant systems In order to create more secure systems, standards such as Federal Information Processing Standard 140-2 ( FIPS-140) are being more widely used. The FIPS standard provides for limits on which cryptogra... Network Security Protocols
RADIUS Insecurity RADIUS is almost thirty years old, and uses cryptography based on MD5. Given that MD5 has been broken for over a decade, what are the implications for RADIUS? Why is RADIUS still using MD5? RADIUS sti... Network Security Protocols
Announcing SRADIUS RADIUS has used MD5 for security for almost thirty years. It is time to use a modern alternative: SRADIUS! We just released an Internet-Draft which defines “Secure RADIUS”, or “SRADIUS”. We also have ... Network Security Protocols
Introducing RADIUS 1.1 RADIUS has a problem. The name of the problem is MD5. The MD5 hash algorithm was defined in 1991, and was used in RADIUS in 1993. However, MD5 is no longer secure. It is a bit of a miracle that RADIUS... Network Security Best Practices Network Security Protocols
Looking Forward to IETF 122 We have been involved in the Internet Engineering Task Force (IETF) for a few decades now. During that time, we have written many of the RADIUS standards. We are still involved in the standards proces... Network Security Protocols
Inaugural RADIUS Conference Set for March 12–13, 2025 FOR IMMEDIATE RELEASE Jana Sedivy InkBridge Networks jana.sedivy@inkbridgenetworks.com InkBridgeNetworks.com Inaugural RADIUS Conference Set for March 12–13, 2025 The first-ever global RADIUS conferen... Network Security Protocols