Open source is paying the price for AI agent governance failures An AI agent had its code rejected by an open-source maintainer, then autonomously published a hit piece on him. The governance frameworks that might have prevented this barely exist yet. ByJana Sedivy... Industry Insights and Trends Security Threats and Vulnerabilities
MS-CHAP is dead MS-CHAP has been in use since 1998. It was Microsoft's answer to the challenge of authenticating users over networks, built into every version of Windows and deeply embedded in VPN and Wi-Fi infrastru... Network Security Protocols
AI intrusion detection AI can spot network intruders brilliantly, but it can also create more security disasters than it's preventing. By Jana Sedivy, VP of Customer Experience and Product Yes, AI is transforming network se... Industry Insights and Trends Security Threats and Vulnerabilities
Human-centred security: Designing systems for how people actually work The future of cybersecurity lies not in more complex systems but in better integration between human psychology and technical solutions. By designing security solutions that work with human nature rat... Enterprises Network Security Best Practices
AI in network management: A hard look at real-world limitations Today, AI sits at the peak of the hype cycle, but AI in network management faces fundamental challenges that the industry seems reluctant to acknowledge. While it's revolutionizing certain fields, net... Industry Insights and Trends
What does "unresponsive child" error message mean? Like any system, FreeRADIUS provides error messages to inform administrators of problems within the FreeRADIUS server itself. Sometimes however, error messages that are logged by FreeRADIUS are actual...
Enterprise ransomware prevention starts with network authentication When properly implemented, network authentication can serve as a powerful barrier against ransomware attacks, stopping bad actors before they gain the initial foothold they need. In 2024, the number o... Enterprises Security Threats and Vulnerabilities
Why you should separate historical data from live data Live operational data and historical archive data should be stored in separate databases. The live database stays small and fast for real-time Authentication and Accounting, while the archive database... Internet Service Providers Network Architecture
Press release: Network Authentication Leader InkBridge Networks Names Its Director of Security FOR IMMEDIATE RELEASE Jana Sedivy InkBridge Networks jana.sedivy@inkbridgenetworks.com InkBridgeNetworks.com Network Authentication Leader, InkBridge Networks, Names Its Director of Security As cybert...
Exposed: National Public Data breach makes a nation’s secrets public The hacking of 270 million social security numbers from National Public Data reinforces the best practice for personal data: always encrypt PII. The cat is out of the bag for National Public Data. In ... Security Threats and Vulnerabilities
Big Tech Concentration Made CrowdStrike Update a Catastrophe As we dissect the CrowdStrike outage, we’ll find the human error was multiplied by the concentration in Big Tech, says network security expert Alan DeKok of InkBridge Networks. There will be intense r... Industry Insights and Trends Security Threats and Vulnerabilities
Building RADIUS high availability systems that eliminate network downtime Enterprise networks require authentication systems that never fail. Here's how to build RADIUS high availability architecture that delivers true network reliability. When network authentication goes d... Internet Service Providers Network Architecture