As packages left outside home for delivery are targeted for theft this holiday season, police warn more thieves are using ...
A wireless network in your business gives your team the convenience of being able to use their mobile devices or computers from anywhere in your building. Unfortunately, without the proper security, ...
Many IT managers have heard the news that there are people out there who live to spam corporate networks, send malicious viruses, and take over enterprise Web sites. We don't have to live in fear and ...
Deploying first-rate wireless security tools is a worthless endeavor if the enterprise is not diligent in keeping them current. Not updating security in access points and other gear can be worse than ...
802.11b security is the buzz in the industry right now. The way some describe it, you'd think "802.11b" and "security" are mutually exclusive. Integrated Solutions, September 2002 Written by: Chuck ...
For some time now, there's been no question in my mind that the best route to establishing a secure wireless LAN goes through an AAA server. Also known as a remote authentication dial in user service ...
The National Institute of Standards and Technology, the federal agency responsible for defining security standards and practices for the government, plans to issue new guidelines pertaining to ...
WPA brings several security improvements to the airwaves. WPA uses Temporal Key Integrity Protocol (TKIP), which replaces WEP's 40-bit static key with a 128-bit dynamically assigned key. That ...
Best practices in WLAN security hinge on your specific security needs and the technologies you choose to satisfy those needs. Not long ago, the complaint heard about wireless LAN security was that ...
Despite the ratification of key wireless standards, the actual use of stronger security mechanisms in current WLAN deployments is low, reports In-Stat. That may soon change, however, as many companies ...
As expected, Cisco Systems Inc. has beefed up security for its wireless LAN product line to help prevent hackers from hijacking a user’s identity during an authentication session. Cisco today will ...
Editor’s note: This column is a follow-up to an earlier article titled: Securing the Air: Recognizing Risk in Wireless. The mobility and productivity benefits of 802.11 wireless LANs don’t have to put ...