Exploring EAP

As discussed in an earlier blog WPA2 Enterprise allows a network to authenticate each user with unique credentials, rather than a blanket passphrase. This is done through an EAP exchange over the 802.1X framework. We’ve touched on this briefly in a post about RBAC, but I wanted to take some time to review two of […]

Read More Exploring EAP

Thoughts on the CWSP…

So, today I passed the Certified Wireless Security Professional (CWSP) exam. For those of you not familiar with the CWNP program, it’s an intensive vendor-neutral certification path that delves deeply into 802.11 tech… VERY deeply. It’s been very beneficial for my career, and it’s one of the few educational courses that I truly enjoy. Anyone […]

Read More Thoughts on the CWSP…

Understanding Wireless Encryption

Wireless is great because it gives you mobility – you can get your work done just about anywhere these days (which is both a good and a bad thing)! But there is an inherent drawback to mobility as wireless traffic is unbounded. It flows in all directions and eavesdropping on private conversations is both easy […]

Read More Understanding Wireless Encryption

Role Based Access Control

You’re only as strong as your weakest link. This old adage is especially true when it comes to network security. You can purchase the most expensive, ridiculously feature-rich firewall on the market, install it at the WAN edge, and think that you are safe. But without internal network controls in place as well, you run […]

Read More Role Based Access Control