Posts with tag "WPA"

Cybersecurity in a Zero Trust Architecture

Cybersecurity in a Zero Trust Architecture

Your traditional enterprise network security model may need to lose some trust.

Guests Need Wi-Fi Access Too, Ya’know

Guests Need Wi-Fi Access Too, Ya’know

What are your options to provide secure Wi-Fi access to guests without administrative burden?

What Do We Want? Wi-Fi Protected Access! When Do We Want WPA3? Now!

What Do We Want? Wi-Fi Protected Access! When Do We Want WPA3? Now!

WPA3 protects against dictionary attacks, airport hackability and more.

WPA2 Key Reinstallation Attacks

WPA2 Key Reinstallation Attacks

I will assume if you're reading this, you have already heard the news – the world's first major break in WPA2-Enterprise.  If not, head over to the excellent site  created by the author of the attack,...

New Powerpoint makes setting up a Controller and CPPM for EAP-TLS & EAP-PEAP easy

New Powerpoint makes setting up a Controller and CPPM for EAP-TLS & EAP-PEAP...

EAP-TLS and EAP-PEAP are two of the most highly used authentication mechanisms on enterprise WLAN.  

Pretty Fly For A Wi-Fi  - Black Hat 2012

Pretty Fly For A Wi-Fi – Black Hat 2012

Back in beautiful Las Vegas for another Black Hat event – more malware, more exploits, and more multicolored shorts with plaid socks than you can shake a stick at! (Who knew these attendees could be...