The National Institute of Standards and Technology, the federal agency responsible for defining security standards and practices for the government, plans to issue new guidelines pertaining to ...
eWEEK content and product recommendations are editorially independent. We may make money when you click on links to our partners. Learn More. Cisco Systems Inc. is preparing to introduce products to ...
A man working for a digital media company in a WeWork building was able to view hundreds of documents belonging to other ...
MANHASSET, N.Y. — The already competitive wireless LAN (WLAN) security market heated up with product launches from Highwall Technologies and AirTight Networks. Highwall announced the release of the ...
Best practices in WLAN security hinge on your specific security needs and the technologies you choose to satisfy those needs. Not long ago, the complaint heard about wireless LAN security was that ...
WPA brings several security improvements to the airwaves. WPA uses Temporal Key Integrity Protocol (TKIP), which replaces WEP's 40-bit static key with a 128-bit dynamically assigned key. That ...
For some time now, there's been no question in my mind that the best route to establishing a secure wireless LAN goes through an AAA server. Also known as a remote authentication dial in user service ...
As expected, Cisco Systems Inc. has beefed up security for its wireless LAN product line to help prevent hackers from hijacking a user’s identity during an authentication session. Cisco today will ...
Despite the ratification of key wireless standards, the actual use of stronger security mechanisms in current WLAN deployments is low, reports In-Stat. That may soon change, however, as many companies ...
Over the past few years, a significant penetration of Voice over IP (VoIP) systems has occurred in both enterprise and residential markets. VoIP enables the convergence of data and voice networks into ...
Today, wireless architecture has evolved to fit better with enterprise network management. The WLAN switch takes the burden of security off tiny, sweating CPUs in access points and places it squarely ...