About The Editor

This author has not yet filled in any details.
So far The Editor has created 12 blog entries.

You Have 99 Problems; Securing Your Wi-Fi Should NOT Be One of Them

Prepare to be amazed in the Putting the “Why” in Wi-Fi Security webinar.

With Wi-Fi vulnerabilities like the “Evil Twin” access point making global headlines, it’s not just about Wi-Fi connectivity anymore—security needs to come first. Wi-Fi security is a complicated technology area, and security-related messaging coming from many vendors creates more confusion than clarity. To remedy this industry challenge, WatchGuard has introduced the Trusted Wireless Environment Framework for building a complete Wi-Fi solution that is fast, easy to manage, and most importantly, secure—automatically blocking attacks coming from the six known Wi-Fi threat categories.

In this webinar, Ryan Orsi, Director of Product Management at WatchGuard and Miercom CEO Robert Smithers uncover what it takes to test the security efficacy of Wi-Fi access points. You’ll hear first-hand from Robert about how WatchGuard’s Wi-Fi stacks up against the other AP vendors: Cisco Meraki, Aruba, and Ruckus.

In the meantime, download the Wi-Fi Security report for a sneak peek at the test results, and ask your IT colleagues or service providers to make sure that your Wi-Fi network meets the security standards defined by the Trusted Wireless Environment Framework.

Russian Wi-Fi Hackers – Daily Security Byte

Last week, Dutch authorities found Russian spies allegedly trying to man-in-the-middle (MitM) the Wi-Fi network of the Organization for the Prohibition of Chemical Weapons in The Hague. Authorities claim the GRU was also found doing similar attacks against anti-doping agencies around the world. Turns out, these nation-state attackers still use off-the-shelf hacking tools like the Wi-Fi Pineapple, and use classic wireless attack techniques like the Evil Twin attack. Watch today’s video to learn more about these allegations, the Evil Twin attack, and what you can do to protect yourself from this type of wireless assault.


Episode Runtime: 3:44

Direct YouTube Link: https://www.youtube.com/watch?v=K0edr-DImz4

EPISODE REFERENCES:

Corey Nachreiner, CISSP (@SecAdept)