WLAN Security

Email Alerts

Register now to receive SearchNetworking.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Wireless security push fueled by paranoia

    Wireless security became a necessity for Intermagnetics, but when the company used its access points to monitor the spectrum, performance suffered. 

  • Wireless security boost for laptops outside the office

    Most companies do a pretty good job with wireless security within the office walls, but what happens when end users take their laptops home -- or to Starbucks? 

  • Intel's Centrino gear vulnerable to attack

    Chip giant Intel says a trio of flaws may lead to remote code execution, privilege escalation and disclosure of security information. AV firms say the flaws could spawn a new wireless worm. 

  • Wireless cards make notebooks easy targets for hackers

    Black Hat: Experts say flawed wireless cards are an industry-wide notebook security problem, thanks to weak device drivers and vendors who ship products without proper testing. 

  • Network policy: 'No wireless' restriction enforced at Blue Cross

    Blue Cross of Idaho had a "no wireless" policy on paper but never really enforced it -- until a team of auditors said the company had better do something. 

  • What is the purpose of Wi-Fi ad-hoc mode?

    Our wireless networking expert, Lisa Phifer, defines and explains Wi-Fi ad-hoc mode and its pros and cons, in this Ask the Expert response. 

  • Wi-Fi firewalls boost wireless security by blocking airborne attacks

    Wi-Fi firewalls, or wireless intrusion prevention systems, are servers that monitor and filter Wi-Fi traffic, blocking unauthorized 802.11 usage and attacks while still in the air. Learn about the benefits of the product and what to consider when sel... 

  • Five steps to stamp out unsafe Wi-Fi use

    Lisa Phifer helps dispel the top myths of wireless security and explains five steps that network administrators can take to lead their users toward safer Wi-Fi usage. 

  • Mobile client security

    As more companies employ a mobile workforce, security becomes a critical factor. Organizations are no longer looking for access mechanisms; they are looking for ways to secure the data over the multitudes of access options. In this tip, Robbie Harrel... 

  • Weighing the costs of wireless network management

    Wireless devices may be getting less expensive, but the cost of managing those devices is rising. Before jumping into wireless network deployment, there are some things that SMBs need to know.