WLAN Security
Top Stories
-
Tip
08 Nov 2017
Need help making Wi-Fi secure? Consider some 'classic' approaches
Keeping your Wi-Fi secure is a challenge, to say the least. Security hasn't kept up with Wi-Fi advances, but there are steps you can take to keep your Wi-Fi network protected. Continue Reading
-
News
20 Sep 2017
Aruba launches 360 Secure Fabric user behavioral analytics system
Artificial intelligence and machine learning are key components of the newly launched Aruba 360 Secure Fabric user behavioral analytics security software. Continue Reading
-
News
27 Jun 2017
Cisco and Apple alliance deepens, targets security and Wi-Fi projects
With Cisco's Ericsson partnership on hold for now, the Cisco and Apple CEOs hinted at joint work on Wi-Fi and security at Cisco annual customer conference. Continue Reading
-
News
18 Jan 2017
DARPA project could help with mobile security in the enterprise
A DARPA project seeks researchers from academia and business to improve security for mobile networks and devices. The program could bring better tools for the enterprise. Continue Reading
-
Photo Story
21 Dec 2015
Five essential network security topics and trends to watch
With a constant drumbeat of security and data breaches in 2015, it's no wonder networking pros have questions and concerns about network security topics. These five stats can get you started. Continue Reading
-
News
17 Jul 2014
How Apple iOS MAC address spoofing affects location-based services
Apple iOS 8 will add a MAC address spoofing feature to iPhones and iPads for wireless privacy. It could interfere with Wi-Fi location-based services used by many consumer-facing businesses. Continue Reading
-
Feature
11 Feb 2013
Download Network Evolution E-Zine
Gain expert insight into how to build your network infrastructure to enable the changing face of IT. Tackle your everyday networking challenges with expert advice to keep your network up and running. Continue Reading
-
Tip
14 Dec 2006
Cisco WLAN design best practices
Wireless LAN (WLAN) technology has built-in security features, but a one-size-fits-all approach won't ensure adequate security for your organization. This tip provides best practices for designing your security architecture, including user community considerations, controller architecture and access point placement. Examples are specific to the Cisco Unified WLAN solution, but best practices apply for any WLAN deployment. Continue Reading
-
Feature
16 Jun 2006
Wi-Fi firewalls boost wireless security by blocking airborne attacks
Wi-Fi firewalls, or wireless intrusion prevention systems, are servers that monitor and filter Wi-Fi traffic, blocking unauthorized 802.11 usage and attacks while still in the air. Learn about the benefits of the product and what to consider when selecting one. Continue Reading
-
Tip
07 Jun 2006
Five steps to stamp out unsafe Wi-Fi use
Lisa Phifer helps dispel the top myths of wireless security and explains five steps that network administrators can take to lead their users toward safer Wi-Fi usage. Continue Reading
-
Feature
10 Apr 2006
Lesson 2: How to build a secure wireless infrastructure
In Lesson 2 of Wireless Security Lunchtime Learning, you'll learn how to build a secure wireless infrastructure by understanding the myriad security standards and features that Wi-Fi products boast, as well as how traditional wired network devices and configurations can be applied to a WLAN. Continue Reading
-
Feature
10 Apr 2006
Wireless attacks, A to Z
In our buzzword-filled industry, wrapping your arms around wireless attacks and their potential business impacts can be tough. This tip tries to bring order to this chaos by providing a reference list of attacks against 802.11 and 802.1X, categorized by type of threat, and mapped to associated hacker methods and tools. Continue Reading
-
Feature
10 Apr 2006
Wi-Fi vulnerability assessment checklist
Vulnerability assessments can help you find and fix WLAN weaknesses before attackers take advantage of them. But where do you start? What should you look for? Have you covered all the bases? This checklist will help to answer these questions. Continue Reading
-
Tip
31 Jan 2006
Router Expert: Initial configuration of a Cisco 1200 802.11g WLAN access point
Our router expert continues his series on building a secure wireless LAN with a Linux base. This article explains how to utilize a single Cisco 1200 series access point to provide access to three different IP network segments using VLANs and multiple service set identifiers. Continue Reading
- Answer 08 Sep 2005
-
Tip
27 Jun 2005
Wireless LAN deployment and federal regulations
A look at the bare minimum requirements to keep your WLAN compliant with federal regulations. Continue Reading
-
Tip
16 Jun 2005
Secure WLAN best practices and topology
Expert Michael Martin provides a list of wireless security "dos and don'ts" and a sample topology for a secure WLAN. Continue Reading
-
News
23 Jan 2005
Watch out for Wi-Fi's 'evil twin'
Experts warn that the latest Wi-Fi security risk could endanger enterprise data. The 'evin twin' scam involves tricking users into logging on to rogue access points set up to emulate legitimate wireless LAN equipment. Continue Reading
-
News
20 Jan 2005
Group provides Wi-Fi during Bush inauguration
A nonprofit community group called the Open Park Project is providing the free service this week in what its founders describe as an exercise in wireless democracy. Continue Reading
-
News
17 Jan 2005
Painting over Wi-Fi leaks
Force Field Wireless claims its grey $69-per-gallon paint, laced with copper and aluminum fibers that form an electromagnetic shield, can prevent outside intruders from compromising a wireless network. The vendor says the paint isn't foolproof, and can sometimes interfere with other electronic devices. Continue Reading
-
Tip
02 Mar 2004
WLAN security: Beyond the VPN
Wired networks have used virtual private networks (VPNs) to secure transactions across this edge, but this approach has its limitations. Continue Reading
- Answer 05 Jun 2003
-
News
21 Aug 2002
Security is WLAN's strength and weakness
Security is the Achilles' heel of wireless local are networks, but also one of its best opportunities. Continue Reading