New & Notable
Wireless Network Protocols and Standards News
December 29, 2009
Karsten Nohl, a widely known encryption expert, has cracked the GSM encryption algorithm and claims software is available for hackers to eavesdrop on calls.
September 04, 2009
The channel's best bet to profit from WLAN security is in services, ranging from planning and installing secure wireless networks to security and compliance monitoring.
July 30, 2009
Researchers have figured out a way to spoof sender numbers, bypass carrier protections and trick mobile devices to pull content from an attacker's server. This would leave users vulnerable to phishing attacks and other scams.
July 16, 2009
Guide analyzes PCI requirements pertaining to wireless networks and provides recommendations.
Wireless Network Protocols and Standards Get Started
Bring yourself up to speed with our introductory content
This mini learning guide helps enterprise information security managers and executives develop a better understanding of wireless network security and learn why investing time and resources in securing your wireless network can help thwart security ... Continue Reading
Don't let Wi-Fi become the weak link in your network's armor! Learn the business risks posed by wireless, essential countermeasures that can reduce those risks, and industry best practices for designing, deploying and monitoring secure WLANs. Continue Reading
Wired Equivalent Privacy (WEP) is a security protocol, specified in the IEEE Wireless Fidelity (Wi-Fi) standard, 802.11b, that is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what is ... Continue Reading
Evaluate Wireless Network Protocols and Standards Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Readers vote on the best wireless security products, including wireless firewalls and UTM devices, wireless access control products, WLAN intrusion and detection systems, and security-enabled wireless infrastructure products Continue Reading
A new paper highlighting the weakness of Wired Equivalent Privacy (WEP) is a call to all users to switch to the more secure Wi-Fi Protected Access 2 (WPA2). Continue Reading
This week in Security Blog Log: Infosec pros slam HID Corp., the firm that tried to quash a Black Hat presentation on flaws in its RFID technology, calling HID the latest champion of security through obscurity. Continue Reading
Manage Wireless Network Protocols and Standards
Learn to apply best practices and optimize your operations.
Expert Mike Chapple examines wireless vs. wired security and offers his enterprise wireless network security best practices. Continue Reading
Many WLAN owners know that 802.1X/EAP makes it possible to authenticate individual wireless users. But did you know that 802.1X can also be used to funnel wireless traffic onto VLANs, enforcing user or group-based permissions? This tip explains how ... Continue Reading
The TJX data breach revealed all too well the weaknesses of the Wired Equivalent Privacy security model. The retailer's well-documented compromise of more than 94 million credit card numbers proved that intruders can easily take advantage of ... Continue Reading
Problem Solve Wireless Network Protocols and Standards Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Expert Matt Pascucci discusses how the new Cisco 802.11ac wireless standard differs from others and possible security implications of gigabit Wi-Fi. Continue Reading
Will Gigabit Wi-Fi significantly alter network security, or will it mean business as usual? Expert Brad Casey discusses the new 802.11ac standard. Continue Reading
Expert Matthew Pascucci weighs in on why so many enterprises still use the insecure wireless encryption protocols -- WPA and WEP. Continue Reading