If the challenge of securing a wireless LAN wasn't already confusing enough, things have just gotten worse. The confusion started last month when the Wi-Fi Alliance changed the WPA and WPA2 standards ...
Security tops the wireless LAN priority list for many network administrators, but the standards for encryption and authentication are still in a state of flux. Rapid developments in this area are ...
This short primer will provide a few guidelines to consider when choosing an Extensible Authentication Protocol (EAP) method, one element of the authentication component of your Wi-Fi security plan.
I'll start with the background. We have wireless deployed in certain locations at work. It's currently setup using WPA2-Enterprise with AES encryption and the authentication is EAP-TLS. All our ...
Wireless technologies continue to grow with no sign of slowing down. Today, companies need to understand the advances in wireless security standards so they can easily integrate wireless ...
META Trend: The campus/LAN will become increasingly application aware (2003/04), as products incorporate expanded services such as quality of service, security, and user-based policy. By YE02, 75% of ...
Cisco Systems Inc. has developed a new wireless LAN security protocol designed to defeat brute force dictionary attacks that capture a user’s passwords, and it submitted a draft of the protocol to the ...
Protected Extensible Authentication Protocol, better known as PEAP is a protocol that adds an extra layer of security to wireless LANs and point-to-point connections with PEAP passwords. The protocol ...
Apple’s iOS 8 addresses a serious weakness that could allow attackers to hijack the wireless network authentication of Apple devices and gain access to enterprise networks. “An attacker could have ...