Email Alerts
-
Wireless Lunchtime Learning Security School
guide
-
Handheld and mobile device security: Mobile malware, breach prevention
This mini learning guide offers tips from the experts on how to bulk up your mobile device security policies and techniques in order to protect sensitive corporate data. Our experts define common mobile device security concerns, and identify must-hav... Learning Guide
-
Securing your wireless network: Preventing wireless security threats
This mini learning guide helps enterprise information security managers and executives develop a better understanding of wireless network security and learn why investing time and resources in securing your wireless network can help thwart security t... Learning Guide
-
How to monitor WLAN performance with WIPS
"Wireless intrusion prevention" -- the very name brings to mind security. But many WIPS products can also be used to monitor WLAN performance, providing valuable insight for trouble-shooting, fine-tuning, and usage planning. This tip explains how to ... Security School
-
Lesson 4 quiz: How to use wireless IPS
Find out how much you learned in Lesson 4 of Wireless Security Lunchtime Learning. School
-
Wireless intrusion prevention systems: Overlay vs. embedded sensors
WIPSes rely on sensors to observe and forward traffic summaries to a central analysis server. Overlay WIPS use special-purpose sensors, dedicated to this monitoring task. Embedded WIPS use APs to monitor the WLAN in their spare time. This tip compare... Security School
-
Wireless Security Lunchtime Learning Final Exam
You've finished Wireless Security Lunchtime Learning, now take this 10-question multiple-choice exam to see how much you've retained. Security School
-
How to prevent wireless DoS attacks
Despite recent 802.11 security advances, WLANs remain very vulnerable to Denial of Service attacks. While you may not be able to prevent DoS attacks, a WIDS can help you detect when DoS attacks occur and where they come from, so that you can track th... Security School
-
Rogue AP containment methods
Wireless network monitoring systems are quickly moving from detection alone to detection and prevention. In particular, many now provide options to "block" rogue devices, preventing wireless or wired network access. This tip explores how these contai... Security School
-
The role of VPN in an enterprise wireless network
Given improvements in Wi-Fi security, does VPN still have a role to play in enterprise wireless? What are the practical benefits and limitations of using VPN over wireless? This tip discusses where to make best use of VPNs and how to smooth over conf... Security School
- See more Essential Knowledge on Wireless LAN Design and Setup
-
NIST releases SP 800-153 WLAN security guidelines
The recently released NIST SP 800-153 addresses security of WLANS. Join us, as we take a closer look at the document’s recommendations. News | 07 Mar 2012
-
Savvy VARs should capitalize on wireless LAN security services
The channel's best bet to profit from WLAN security is in services, ranging from planning and installing secure wireless networks to security and compliance monitoring. Article | 04 Sep 2009
-
Study reveals lack of financial wireless computer security
Vulnerability scanning in the financial districts of seven cities by AirTight Networks show many misconfigured and unmanaged wireless network access points. News | 14 May 2009
-
Cisco corrects serious Wireless LAN flaws
Several denial-of-service vulnerabilities and a privilege escalation flaw affects a wide range of Cisco Wireless LAN controllers, the networking giant warned. Article | 05 Feb 2009
-
RSA survey finds rapidly growing LAN deployments
In this edition of the Security Newsmakers podcast, Sam Curry, vice president of RSA's Identity and Access Assurance Group, talks about RSA's annual wireless security survey of New York, London and Paris. News | 03 Dec 2008
-
PCI DSS 1.2 clarifies wireless, antivirus use
Version 1.2 of PCI DSS, due out in October, requires 802.1x for wireless protection and antivirus for all operating systems, according to a summary of the changes issued Tuesday. Article | 19 Aug 2008
-
Wi-Fi simplicity edging out Wi-Fi security
Experts say the standards are available to lock down Wi-Fi, but many network and security managers are taking an easier approach. Article | 09 Aug 2007
-
Cisco issues warning for wireless LAN controller flaws
Cisco Systems Inc. is warning customers of flaws in its wireless LAN controllers that initially crippled a wireless network at Duke University. Article | 24 Jul 2007
-
Aruba bolsters mobile suite with security acquisition
Mobile security vendor Aruba Networks Inc. acquires wireless intrusion detection and prevention software and Bluetooth assessment tools from Network Chemistry. Article | 23 Jul 2007
-
VeriSign, AirMagnet team up for wireless IPS
Gartner IT Security Summit: VeriSign and AirMagnet announce collaboration on the new VeriSign Wireless Intrusion Prevention Service (IPS) to help IT shops defend Wi-Fi users. Article | 04 Jun 2007
- See more News on Wireless LAN Design and Setup
-
Wireless network guidelines for PCI DSS compliance
The PCI Security Standards Council recently released additional guidance for WLANs, but do they make the compliance process easier? Contributor Ben Rothke examines the key points of the new guidelines and offers additional advice for organizations wi... Tip
-
Video: Setting up a secure wireless network
In a four-part video series, Joel Snyder of Opus One walks you through the phases of a secure wireless network setup. Tip
-
How to configure NAP for Windows Server 2008
The arrival of Windows Server 2008 ushers in a big portion of Microsoft's long-awaited Network Access Protection (NAP) initiative. In this tip, David Strom uses words and pictures to explain how to get started with NAP using the Network Policy Server... Tip
-
How to build security into a virtualized server environment
Virtualization is a transformative technology, and while virtual servers promise to increase efficiency in the enterprise, some key security implications are often going ignored. Contributor Thomas Ptacek outlines the security issues in today's virtu... Tip
-
Lessons learned from TJX: Best practices for enterprise wireless encryption
The TJX data breach revealed all too well the weaknesses of the Wired Equivalent Privacy security model. The retailer's well-documented compromise of more than 94 million credit card numbers proved that intruders can easily take advantage of unprote... Tip
-
How 'evil twins' and multipots seek to bypass enterprise Wi-Fi defenses
Enterprise Wi-Fi threats are an ever-present struggle for security managers, and the most simplistic attack methods are often the most effective. In this tip, contributor Noah Schiffman explains how "evil twin" attacks work and why its sister attack ... Tip
-
Public wireless networks present a raft of dangers
A company's end-users don't always have the luxury of a protected network, as many often leave the comfort of their guarded corporate environment and access the Internet from coffee shops, hotels, airports and other public areas. In this tip, Mike Ch... Tip
-
Access security with KoolSpan's SecurEdge
Information Security magazine's technical editor Brent Huston reviews KoolSpan's SecurEdge. Tip
-
Know your wireless encryption options
Understanding wireless encryption is essential to deploying a secure wireless network. Contributor Tony Bradley breaks down the different encryption methods and explains why some are better than others. Tip
-
2006 Products of the Year: Wireless
Information Security magazine and SearchSecurity.com asked their readers to chose the best wireless products. Here's what you told us. Tip
- See more Tips on Wireless LAN Design and Setup
-
QR codes security: Do malicious QR codes pose a risk?
Expert Nick Lewis discusses QR codes security and whether malicious QR codes pose enough risk to justify disabling them. Answer
-
Detecting mobile devices on a wireless guest network
The approach to detecting mobile devices on wireless guest networks is not the same as managing mobile devices on corporate networks. Our expert explains. Answer
-
How to create a secure conference room with a WLC/NAC configuration
Conference rooms are often hosts to corporate-owned and guest devices, so what 's the best secure authentication setup? Security pro Anand Sastry weighs in. Ask the Expert
-
How to block port scan attempts on a public wireless network
Network security expert Anand Sastry explains how to block port scan attempts on a public wireless network at the host level. Ask the Expert
-
Should Apple iPhones automatically connect to Wi-Fi networks?
Well-managed enterprises should have functions in place to prevent an unauthorized mobile device, like the iPhone, from connecting to the network. In this expert response, Mike Chapple reveals some simple network security measures that organizations ... Ask the Expert
-
Is it possible to identify a fake wireless access point?
A network's identity is easy to fake. If you're looking for proof of a valid access point, Mike Chapple reveals some secure wireless options. Ask the Expert
-
Should a network be regularly checked for rogue access points?
Some enterprises may have to scan their network more frequently for rogue access points. In this expert Q&A, Michael Cobb explains what tools are necessary for period AP checks. Ask the Expert
-
Will securing a wireless LAN make the data link layer vulnerable?
Even when an organization uses a VPN to secure a wireless LAN and users' transmitted data, there are still vulnerabilities. In this expert Q&A, network pro Mike Chapple explains what security issues can arise at the data link layer. Ask the Expert
-
Which wireless security assessment tools are commercially available?
Most auditors use open source tools to perform wireless assessments. There are other commerical options, though, as network security expert Mike Chapple explains in this SearchSecurity.com Q&A. Ask the Expert
-
What is WiPhishing?
In this expert Q&A, information security threats expert Ed Skoudis addresses WiPhishing and the reasons you shouldn't trust every wireless access point. Ask the Expert
- See more Expert Advice on Wireless LAN Design and Setup
-
evil twin
In security, an evil twin is a home-made wireless access point (hot spot) that masquerades as a legitimate one to gather personal or corporate information without the end-user's knowledge... (Continued) Definition
-
Risky Business: Understanding WiFi threats
Interested in taking your enterprise wireless, or securing the wireless network you already have? Look no further. In this first of a four-part video series, Lisa Phifer of Core Competence explains WiFi threats, including some common attacks. Video
-
I'll be watching you: Wireless IPS
Focusing on IPS, Lisa Phifer of Core Competence Inc. discusses some of IPS' common features and how it differs from its wired counterparts. Video
-
From the ground up: Creating secure WLANs
In this video, Lisa Phifer of Core Competence Inc. focuses on creating secure WLANs, including WLAN basics and implementation best practices. Video
-
Who goes there? Securing wireless access
Learn more about securing wireless access, including best practices for wireless access configuration from Lisa Phifer of Core Competence Inc. Video
-
How to increase the RF footprint and bandwidth of a wireless network
In this video, Joel Snyder of Opus One reviews how to provide sufficient network bandwith to all the users in your organization. Video
-
How to manage guest user authentication when building a wireless network
Joel Snyder reviews your different access policies and how to deal with the threat of unauthenticated users. Video
-
NIST releases SP 800-153 WLAN security guidelines
The recently released NIST SP 800-153 addresses security of WLANS. Join us, as we take a closer look at the document’s recommendations. News
-
Wireless Lunchtime Learning Security School
guide
-
QR codes security: Do malicious QR codes pose a risk?
Expert Nick Lewis discusses QR codes security and whether malicious QR codes pose enough risk to justify disabling them. Answer
-
Detecting mobile devices on a wireless guest network
The approach to detecting mobile devices on wireless guest networks is not the same as managing mobile devices on corporate networks. Our expert explains. Answer
-
How to create a secure conference room with a WLC/NAC configuration
Conference rooms are often hosts to corporate-owned and guest devices, so what 's the best secure authentication setup? Security pro Anand Sastry weighs in. Ask the Expert
-
How to block port scan attempts on a public wireless network
Network security expert Anand Sastry explains how to block port scan attempts on a public wireless network at the host level. Ask the Expert
-
Handheld and mobile device security: Mobile malware, breach prevention
This mini learning guide offers tips from the experts on how to bulk up your mobile device security policies and techniques in order to protect sensitive corporate data. Our experts define common mobile device security concerns, and identify must-hav... Learning Guide
-
Securing your wireless network: Preventing wireless security threats
This mini learning guide helps enterprise information security managers and executives develop a better understanding of wireless network security and learn why investing time and resources in securing your wireless network can help thwart security t... Learning Guide
-
Wireless network guidelines for PCI DSS compliance
The PCI Security Standards Council recently released additional guidance for WLANs, but do they make the compliance process easier? Contributor Ben Rothke examines the key points of the new guidelines and offers additional advice for organizations wi... Tip
-
Savvy VARs should capitalize on wireless LAN security services
The channel's best bet to profit from WLAN security is in services, ranging from planning and installing secure wireless networks to security and compliance monitoring. Article
- See more All on Wireless LAN Design and Setup
About Wireless LAN Design and Setup
What is wireless LAN? Learn about it here and get tips on how to build and setup WLAN, WLAN design, cards, security, devices and software and standards for Wi-Fi networks.
Security Management Strategies for the CIO