Email Alerts
-
Next steps in municipal wireless mesh networks
Strix Systems VP Nan Chen shares his take on the wireless mesh networking market and why he believes that wireless mesh networks are gaining so much momentum. TechColumn
-
Wireless IDS/IPS thwarts mall intruders
Siemens yesterday announced the addition of IDS/IPS and location services to its HiPath wireless line, which the largest shopping mall in the world will use to secure its WLAN. Article
-
Wireless networks are watching you
Location-based technology promises great boons for business and the public good -- but some consumers are still concerned about it infringing on their privacy. Tip
-
Recipe for rogue hunting
Detecting rogues is fairly easy, but eliminating them can be surprisingly tough. This tip describes a methodical rogue hunting process and tools that can help. School
-
Wi-Fi vulnerability assessment checklist
Vulnerability assessments can help you find and fix WLAN weaknesses before attackers take advantage of them. But where do you start? What should you look for? Have you covered all the bases? This checklist will help to answer these questions. School
-
Getting from here to there: WPA2 migration
WEP has been cracked, WPA is a band-aid, and your CSO recommends upgrading to WPA2. Great, but that's just not going to happen overnight. How do you migrate your installed base of legacy equipment? This tip recommends a workable strategy for migratio... School
-
Controlling WLAN access on a tight budget
WPA and WPA2-Enterprise provide robust WLAN access control, but deploying 802.1X can be overwhelming for companies with limited IT staff and budget. From outsource to open source to preshared keys, this tip describes several less complex or costly al... School
-
Wireless attacks, A to Z
In our buzzword-filled industry, wrapping your arms around wireless attacks and their potential business impacts can be tough. This tip tries to bring order to this chaos by providing a reference list of attacks against 802.11 and 802.1X, categorized... School
-
Wireless Security Lunchtime Learning Final Exam
You've finished Wireless Security Lunchtime Learning, now take this 10-question multiple-choice exam to see how much you've retained. School
-
Wireless network security lunchtime learning
Whether your company has grown its WLAN organically, officially deployed a WLAN or implemented a strict policy against WLANs, Wi-Fi poses risks to your network. Our Wireless Security Lunchtime Learning program allows you to develop an in-depth unders... School
Network Management Strategies for the CIO