Email Alerts
-
Stop simultaneous connections to corporate LANs and external Wi-Fi networks
How can you stop simultaneous connections to corporate LANs and external Wi-Fi networks? Find out from wireless expert Lisa Phifer in this Ask the Expert. Ask the Expert
-
What AP configuration will get the best encryption and authentication?
Problems with your wireless connections can be caused by the following. Read security expert Puneet Mehta's response to see what AP configuration will get the best encryption and authentication. Ask the Expert
-
Wireless security -- Defending Wi-Fi clients
When it comes to wireless security, considerable attention has been paid to encrypting data, authenticating users, restricting access, and detecting rogue access points. As these network and link defenses improve, however, attackers have started to t... Tip
-
WLAN security is life or death for hospital
Wireless LAN (WLAN) security is critical for keeping confidential data protected at Tuality Healthcare. Article
-
WEP: Wireless security's broken skeleton in the closet
WEP for wireless security was cracked again recently. Though many will say WEP is obsolete, many companies still use it. Article
-
Will WEP and MAC address filtering protect our WLAN from hackers?
Find out if you're doing enough to protect your WLAN against wireless hackers in this Q&A with Lisa Phifer. Ask the Expert
-
Are new wireless products supporting 802.11n any more or less secure than older 802.11a/b/g wireless
View this expert response to see if new wireless products, supporting 802.11n, are any more or less secure than older 802.11a/b/g wireless products. Ask the Expert
-
Wireless network security best practices
Don't let your wireless LAN (WLAN) jeopardize your corporate networks, servers and data. In this guide, you'll discover how to mitigate the risks WLAN pose and learn how to perform vulnerability assessments to manage potential risks. Best Practices Guide
-
Wireless network security -- Chapter 8 of 'Essential Computer Security'
Starting with a brief overview of the wireless protocols and technology, this chapter will cover what's required to secure your own home wireless network to keep unauthorized users out of your network. This chapter will also examine the security prec... Chapter Download
-
Cisco WLAN design best practices
Wireless LAN (WLAN) technology has built-in security features, but a one-size-fits-all approach won't ensure adequate security for your organization. This tip provides best practices for designing your security architecture, including user community ... Tip
Network Management Strategies for the CIO