Cloud Security Products

As more organizations switch to cloud computing to increase their business’s scalability and usability of their IT assets and processes, one glaring issue that many are not tackling is how to secure cloud networks. Thankfully, many cloud service providers (CSPs) offer their own security systems for their products, […]

The WPA2 handshake and WPA3

The 4-way handshake is the process of sending and receiving four messages between an authenticator (access point) and the supplicant (client device); this generates encryption keys which are then used to encrypt data sent over wireless connections. There are several different keys used in the 4-way handshake, including […]