WiFi Security: WPA2 vs. WPA3
WiFi security just saw its first meaningful update in 15 years. Here’s what you need to know about WPA3, its security features, comparison to WPA2, and migration options. Continue reading WiFi Security: WPA2 vs. WPA3
Collaborate Disseminate
WiFi security just saw its first meaningful update in 15 years. Here’s what you need to know about WPA3, its security features, comparison to WPA2, and migration options. Continue reading WiFi Security: WPA2 vs. WPA3
There are only 3 types of WiFi SSID security profiles in enterprise networks. This article explains the often misleading characteristics of Personal, Enterprise, and Open networks along with security implications and use cases. Continue reading WiFi Security: The 3 Types of WiFi Networks
This deep dive will explain filtering and segmentation, explore ways to enforce segmentation, and become familiar with the relationship of those options to our wireless architecture.
MORE > Click the title to read the full article.
Continue reading Wireless Segmentation and Filtering Deep Dive
Required for security and compliance, segmentation is a major architecture element of a secure wireless network. Here’s an overview of when, why, and how to properly segment wireless including Wi-Fi, IoT, and private cellular.
MORE > Click the titl… Continue reading Wireless Segmentation Concepts: When, Why, and How
Much of my custom zero trust content isn’t publicly available. In this session, I was able to bring custom IANS content to the masses in the (ISC)2 Security Briefing webinar on BrightTalk. The live feedback was outstanding, and I hope you find it usefu… Continue reading Zero Trust: Real-World Tactics and Strategies [BrightTalk On-Demand]
I’ve been a member of the RSAC Program Committee for many years, but it still astounds me how many “hidden gems” and free hands-on labs are scattered throughout the agenda. Plus, learn more about supporting students and Team Rubicon.
MORE > Click t… Continue reading Free Hands-On Hacking, Labs, and Other Hidden Gems of RSAC
You can access content from Chapter 5 “Planning and Design for Secure Wireless”, and learn my 5-phase design methodology for wireless network and security.
MORE > Click the title to read the full article.
Continue reading How to design architecture for enterprise wireless security [Free book excerpt]
Join me as I talk and walk through what’s inside my latest book in this chapter-by-chapter quick peek at the top content and what to look for!
MORE > Click the title to read the full article.
Continue reading What’s Inside the “Wireless Security Architecture” Book?
Learn how to properly secure your enterprise wireless network while considering UX, zero trust and commonly overlooked architectural mistakes. Download a free excerpt from the book.
MORE > Click the title to read the full article.
Continue reading Implementing wireless security in the enterprise [TechTarget Interview]
In this short 15-minute session, you’ll learn about the broad product suite categories such as ZTNA, SASE, SWG, as well as the microsegmentation, and how each solution implements the zero trust security features.
MORE > Click the title to read the … Continue reading Zero Trust Product Suites and Enforcement Modes