WiFi Security: WPA2 vs. WPA3
WiFi security just saw its first meaningful update in 15 years. Here’s what you need to know about WPA3, its security features, comparison to WPA2, and migration options. Continue reading WiFi Security: WPA2 vs. WPA3
Collaborate Disseminate
WiFi security just saw its first meaningful update in 15 years. Here’s what you need to know about WPA3, its security features, comparison to WPA2, and migration options. Continue reading WiFi Security: WPA2 vs. WPA3
There are only 3 types of WiFi SSID security profiles in enterprise networks. This article explains the often misleading characteristics of Personal, Enterprise, and Open networks along with security implications and use cases. Continue reading WiFi Security: The 3 Types of WiFi Networks
Google this week announced the rollout of DNS-over-HTTP/3 (DoH3) for Android 11 and newer devices.
An encrypted DNS protocol, DoH3 is expected to provide performance and safety improvements compared to alternatives, mainly through the QUIC transport la… Continue reading Google Introduces DNS-over-HTTP/3 in Android
This deep dive will explain filtering and segmentation, explore ways to enforce segmentation, and become familiar with the relationship of those options to our wireless architecture.
MORE > Click the title to read the full article.
Continue reading Wireless Segmentation and Filtering Deep Dive
Required for security and compliance, segmentation is a major architecture element of a secure wireless network. Here’s an overview of when, why, and how to properly segment wireless including Wi-Fi, IoT, and private cellular.
MORE > Click the titl… Continue reading Wireless Segmentation Concepts: When, Why, and How
Adobe’s security response team has pushed out a massive batch of patches to cover at least 46 vulnerabilities in a wide range of enterprise-facing software products.
As part of its scheduled Patch Tuesday release for June, Adobe warned of “critical” co… Continue reading Adobe Plugs 46 Security Flaws on Patch Tuesday
A group of academic researchers from the University of Hamburg in Germany has discovered that mobile devices leak identifying information about their owners via Wi-Fi probe requests.
Mobile devices use these probe requests to receive information about … Continue reading Researchers: Wi-Fi Probe Requests Expose User Data
A researcher has shown how a key card feature introduced by Tesla last year could be abused to add an unauthorized key that allows an attacker to open and start a vehicle.
The research was conducted by Martin Herfurt, an Austria-based member of the Tri… Continue reading Researcher Shows How Tesla Key Card Feature Can Be Abused to Steal Cars
You can access content from Chapter 5 “Planning and Design for Secure Wireless”, and learn my 5-phase design methodology for wireless network and security.
MORE > Click the title to read the full article.
Continue reading How to design architecture for enterprise wireless security [Free book excerpt]
Join me as I talk and walk through what’s inside my latest book in this chapter-by-chapter quick peek at the top content and what to look for!
MORE > Click the title to read the full article.
Continue reading What’s Inside the “Wireless Security Architecture” Book?