Email Alerts
-
Enterprise network security visibility: Beyond traditional defenses
Organizations have implemented various network security technologies to gain better visibility into their networks. However, these security technologies place an increased demand on the network. This TechGuide explores how to improve network security... E-Handbook
-
Wireless Lunchtime Learning Security School
guide
-
Securing your wireless network: Preventing wireless security threats
This mini learning guide helps enterprise information security managers and executives develop a better understanding of wireless network security and learn why investing time and resources in securing your wireless network can help thwart security t... Learning Guide
-
Lesson 1 quiz: Risky business 2
How much did you learn about enterprise wireless security from lesson one? Find out how much you retained. Quiz
-
How to configure VLANs with 802.1X for WLAN authorization
Many WLAN owners know that 802.1X/EAP makes it possible to authenticate individual wireless users. But did you know that 802.1X can also be used to funnel wireless traffic onto VLANs, enforcing user or group-based permissions? This tip explains how t... Security School
-
Lesson 3: How to implement secure access 2
In Lesson 3 of Wireless Security Lunchtime Learning, you'll learn the pros and cons of the various wireless access protocols so that you can choose the best method to control, authenticate and authorize access to your WLAN. Security School
-
A wireless network vulnerability assessment checklist
Vulnerability assessments can help you find and fix WLAN weaknesses before attackers take advantage of them. But where do you start? What should you look for? Have you covered all the bases? This checklist will help to answer these questions. Security School
-
An introduction to wireless security
Don't let Wi-Fi become the weak link in your network's armor! Learn the business risks posed by wireless, essential countermeasures that can reduce those risks, and industry best practices for designing, deploying and monitoring secure WLANs. Security School
-
Lesson 1: How to counter wireless threats and vulnerabilities
How secure is your enterprise wireless network? What wireless threats lurk unseen through your company's halls? In Lesson 1 of SearchSecurity.com's Wireless Lunchtime Learning security school, check out a list of wireless network attacks, a wireless ... Security School
-
Wireless Security Lunchtime Learning with Lisa Phifer
It's official: Wireless networks have infiltrated corporations around the globe. But the question is: What security measures need to be put in place to prevent malware from infiltrating those wireless networks? The Wireless Lunchtime Learning Securit... Security School
-
Wireless Security Lunchtime Learning Entrance Exam 2
Test you knowledge of wireless security before jumping into the lessons. Quiz
- See more Essential Knowledge on Wireless Network Protocols and Standards
-
NIST releases SP 800-153 WLAN security guidelines
The recently released NIST SP 800-153 addresses security of WLANS. Join us, as we take a closer look at the document’s recommendations. News | 07 Mar 2012
-
GSM cell phone encryption crack may force operators to upgrade
Karsten Nohl, a widely known encryption expert, has cracked the GSM encryption algorithm and claims software is available for hackers to eavesdrop on calls. Article | 29 Dec 2009
-
Savvy VARs should capitalize on wireless LAN security services
The channel's best bet to profit from WLAN security is in services, ranging from planning and installing secure wireless networks to security and compliance monitoring. Article | 04 Sep 2009
-
MMS messaging spoof hack could have global ramifications
Researchers have figured out a way to spoof sender numbers, bypass carrier protections and trick mobile devices to pull content from an attacker's server. This would leave users vulnerable to phishing attacks and other scams. Article | 30 Jul 2009
-
PCI group releases wireless security guide
Guide analyzes PCI requirements pertaining to wireless networks and provides recommendations. Article | 16 Jul 2009
-
Study reveals lack of financial wireless computer security
Vulnerability scanning in the financial districts of seven cities by AirTight Networks show many misconfigured and unmanaged wireless network access points. News | 14 May 2009
-
RSA survey finds rapidly growing LAN deployments
In this edition of the Security Newsmakers podcast, Sam Curry, vice president of RSA's Identity and Access Assurance Group, talks about RSA's annual wireless security survey of New York, London and Paris. News | 03 Dec 2008
-
Cybersecurity expert sees PCI DSS problems ahead for retailers
It could cost millions of dollars for retailers to rip and replace outdated systems and devices still using Wired Equivalent Privacy (WEP) to secure 802.11 wireless networks, according to a security expert tracking cybersecurity in the retail industr... Interview | 18 Nov 2008
-
PCI groups to focus on wireless, pre-authorization changes
The PCI Security Standards Council has started two special interest groups to focus on pre-authorization and wireless security issues. Article | 21 Aug 2008
-
PCI DSS 1.2 clarifies wireless, antivirus use
Version 1.2 of PCI DSS, due out in October, requires 802.1x for wireless protection and antivirus for all operating systems, according to a summary of the changes issued Tuesday. Article | 19 Aug 2008
- See more News on Wireless Network Protocols and Standards
-
Gigabit Wi-Fi security: Is the new 802.11ac standard worth an upgrade?
Will Gigabit Wi-Fi significantly alter network security, or will it mean business as usual? Expert Brad Casey discusses the new 802.11ac standard. Tip
-
How to prevent a WPS flaw from damaging enterprise wireless security
The recent WPS flaw isn't just a consumer issue. Nick Lewis explains the effect on enterprise wireless security and how to avoid security issues. Tip
-
How to change from WEP to WPA for PCI DSS compliance
The deadline to change from WEP to WPA wireless encryption standard for PCI DSS compliance is quickly approaching. Learn how to change from WEP to WPA and how to ensure that WEP is completely eradicated from your network. Tip
-
Wireless network guidelines for PCI DSS compliance
The PCI Security Standards Council recently released additional guidance for WLANs, but do they make the compliance process easier? Contributor Ben Rothke examines the key points of the new guidelines and offers additional advice for organizations wi... Tip
-
Preparing enterprise Wi-Fi networks for PCI compliance
The Payment Card Industry Data Security Standard (PCI DSS) requires several key measures are in place to protect transaction data on enterprise Wi-Fi networks. In this special tip from Forrester Research, Senior Analyst John Kindervag details what th... Tip
-
Cracks in WPA? How to continue protecting Wi-Fi networks
German researchers recently described a Wi-Fi Protected Access (WPA) flaw that seemed to put the security of the popular wireless protocol in question. Network security expert Mike Chapple explains the vulnerability, but argues that the standard defe... Tip
-
WEP to WPA: Wireless encryption in the wake of PCI DSS 1.2
The PCI Security Standards Council recently announced the upcoming release of PCI DSS version 1.2. Plenty of changes are on the way, but one in particular may call for some significant wireless infrastructure upgrades. Mike Chapple explains why the l... Tip
-
Lessons learned from TJX: Best practices for enterprise wireless encryption
The TJX data breach revealed all too well the weaknesses of the Wired Equivalent Privacy security model. The retailer's well-documented compromise of more than 94 million credit card numbers proved that intruders can easily take advantage of unprote... Tip
-
Know your wireless encryption options
Understanding wireless encryption is essential to deploying a secure wireless network. Contributor Tony Bradley breaks down the different encryption methods and explains why some are better than others. Tip
-
Step-by-Step Guide: How to create a VPN for your wireless network
With wireless networks proliferating its critical that you understand what it takes to build a VPN for a wireless gateway. Brien Posey outlines a Windows-based procedure in this step-by-step guide. Tip
- See more Tips on Wireless Network Protocols and Standards
-
Gigabit Wi-Fi: Security concerns for Cisco 802.11ac gigabit wireless
Expert Matt Pascucci discusses how the new Cisco 802.11ac wireless standard differs from others and possible security implications of gigabit Wi-Fi. Answer
-
Why companies still use the insecure WPA and WEP protocols
Expert Matthew Pascucci weighs in on why so many enterprises still use the insecure wireless encryption protocols -- WPA and WEP. Answer
-
Review wireless network security after Google Street View controversy
Expert Nick Lewis explains the Google Street View controversy and why enterprises should be anxious about their wireless network security, not Google. Answer
-
Wireless vs. wired security: Wireless network security best practices
Expert Mike Chapple examines wireless vs. wired security and offers his enterprise wireless network security best practices. Answer
-
Detecting mobile devices on a wireless guest network
The approach to detecting mobile devices on wireless guest networks is not the same as managing mobile devices on corporate networks. Our expert explains. Answer
-
IEEE 802.11: Handling the standard's wireless network vulnerabilities
IEEE 802.11 has several known vulnerabilities, so what's the best way for enterprises to handle them? Expert Anand Sastry explains. Answer
-
Wireless key security: How to lock down enterprise wireless networking
In this expert response, Mike Chapple presents guidelines for wireless key security, including choosing the most secure wireless key possible. Answer
-
Is introducing Wi-Fi to airplanes is a good idea security-wise?
Wi-Fi on airplanes seems like it will be unavoidable in the future, but what security risks does it pose? In this security threats expert response, learn what airplane Wi-Fi might mean for security, and what precautions to take to protect sensitive d... Ask the Expert
-
What are the dangers of using radio frequency identification (RFID) tags?
In this expert response, Joel Dubin discusses the dangers associated with radio frequency identification (RFID) tags, and how users can protect themselves. Ask the Expert
-
Should Apple iPhones automatically connect to Wi-Fi networks?
Well-managed enterprises should have functions in place to prevent an unauthorized mobile device, like the iPhone, from connecting to the network. In this expert response, Mike Chapple reveals some simple network security measures that organizations ... Ask the Expert
- See more Expert Advice on Wireless Network Protocols and Standards
-
Wired Equivalent Privacy (WEP)
Wired Equivalent Privacy (WEP) is a security protocol, specified in the IEEE Wireless Fidelity (Wi-Fi) standard, 802.11b, that is designed to provide a wireless local area network (WLAN) with a level of security and privacy comparable to what is usua... Definition
-
Risky Business: Understanding WiFi threats
Interested in taking your enterprise wireless, or securing the wireless network you already have? Look no further. In this first of a four-part video series, Lisa Phifer of Core Competence explains WiFi threats, including some common attacks. Video
-
Who goes there? Securing wireless access
Learn more about securing wireless access, including best practices for wireless access configuration from Lisa Phifer of Core Competence Inc. Video
-
Wireless network security: 802.11i and WPA basics
In this video, Joel Snyder of Opus One reviews 802.11i and WPA, along with the other minimum requirements necessary for building a secure network. Video
-
Enterprise network security visibility: Beyond traditional defenses
Organizations have implemented various network security technologies to gain better visibility into their networks. However, these security technologies place an increased demand on the network. This TechGuide explores how to improve network security... E-Handbook
-
Gigabit Wi-Fi: Security concerns for Cisco 802.11ac gigabit wireless
Expert Matt Pascucci discusses how the new Cisco 802.11ac wireless standard differs from others and possible security implications of gigabit Wi-Fi. Answer
-
Gigabit Wi-Fi security: Is the new 802.11ac standard worth an upgrade?
Will Gigabit Wi-Fi significantly alter network security, or will it mean business as usual? Expert Brad Casey discusses the new 802.11ac standard. Tip
-
Why companies still use the insecure WPA and WEP protocols
Expert Matthew Pascucci weighs in on why so many enterprises still use the insecure wireless encryption protocols -- WPA and WEP. Answer
-
Review wireless network security after Google Street View controversy
Expert Nick Lewis explains the Google Street View controversy and why enterprises should be anxious about their wireless network security, not Google. Answer
-
How to prevent a WPS flaw from damaging enterprise wireless security
The recent WPS flaw isn't just a consumer issue. Nick Lewis explains the effect on enterprise wireless security and how to avoid security issues. Tip
-
NIST releases SP 800-153 WLAN security guidelines
The recently released NIST SP 800-153 addresses security of WLANS. Join us, as we take a closer look at the document’s recommendations. News
-
Wireless Lunchtime Learning Security School
guide
-
Wireless vs. wired security: Wireless network security best practices
Expert Mike Chapple examines wireless vs. wired security and offers his enterprise wireless network security best practices. Answer
-
Detecting mobile devices on a wireless guest network
The approach to detecting mobile devices on wireless guest networks is not the same as managing mobile devices on corporate networks. Our expert explains. Answer
- See more All on Wireless Network Protocols and Standards
About Wireless Network Protocols and Standards
Get information and advice on wireless protocols and standards. Discover how to implement several wireless authentication protocols, such as Bluetooth, 802.1x, and WEP, and learn the benefits and security risks associated with the technology.
Security Management Strategies for the CIO