Email Alerts
-
Book of Wireless author on wireless advantages and issues
Wireless technology offers terrific advantages but also presents challenges to both network pros and end users. In this Q&A, John Ross -- author of "The Book of Wireless: A Painless Guide to Wi-Fi and Broadband Wireless" -- talks about trends in wire... Interview | 21 May 2008
-
Aruba Networks unveils wireless intrusion prevention enhancements, other security upgrades, at Inter
Aruba Networks's strengthened their security portfolio, unveiling intrusion prevention enhancements that give networking professionals a chance to write their own wireless defense. Article | 29 Apr 2008
-
What is Cisco LEAP/EAP?
Learn about Cisco's LEAP or wireless EAP, which provides authentication between a wireless client and a WLAN access point using rotating WEP keys. Article | 12 Aug 2007
-
WLAN security is life or death for hospital
Wireless LAN (WLAN) security is critical for keeping confidential data protected at Tuality Healthcare. Article | 03 May 2007
-
WEP: Wireless security's broken skeleton in the closet
WEP for wireless security was cracked again recently. Though many will say WEP is obsolete, many companies still use it. Article | 26 Apr 2007
-
Wireless technology: Five myths debunked
Cisco, along with Forrester Research, recently issued a report calling most wireless LAN fears mere myths, and a campus-wide, all-wireless deployment appears to prove that theory. Article | 08 Nov 2006
-
Wireless security push fueled by paranoia
Wireless security became a necessity for Intermagnetics, but when the company used its access points to monitor the spectrum, performance suffered. Article | 17 Aug 2006
-
Wireless security boost for laptops outside the office
Most companies do a pretty good job with wireless security within the office walls, but what happens when end users take their laptops home -- or to Starbucks? Article | 15 Aug 2006
-
Intel's Centrino gear vulnerable to attack
Chip giant Intel says a trio of flaws may lead to remote code execution, privilege escalation and disclosure of security information. AV firms say the flaws could spawn a new wireless worm. Article | 03 Aug 2006
-
Wireless cards make notebooks easy targets for hackers
Black Hat: Experts say flawed wireless cards are an industry-wide notebook security problem, thanks to weak device drivers and vendors who ship products without proper testing. Article | 02 Aug 2006
Network Management Strategies for the CIO