Wireless Network Security: Setup, Issues and Threats news, help and research - SearchSecurity.co.UK

Wireless Network Security: Setup, Issues and Threats

Email Alerts

Register now to receive SearchSecurity.co.uk-related news, tips and more, delivered to your inbox.
By submitting your personal information, you agree to receive emails regarding relevant products and special offers from TechTarget and its partners. You also agree that your personal information may be transferred and processed in the United States, and that you have read and agree to the Terms of Use and the Privacy Policy.
  • Infosecurity 2012 Europe: Conference news and highlights

    Get the latest news and important research from the Infosecurity 2012 Europe conference, including coverage on security threats and data breaches. 

  • IT in Europe, Security Edition: Smartphone security issues

    How can security teams manage devices they don’t control? Find out how to manage smartphone and tablet security threats. 

  • Roundup: University case studies on innovative security products

    Browse this collection of university case studies from colleges that have successfully implemented innovative security products. 

  • Information Security Learning Guides

    A repository of our Learning Guides. 

  • Using VLANs to compartmentalize WLAN traffic

    Virtual LANs have long been used within enterprise networks to create logical workgroups, independent of physical location or LAN topology. This tip describes how to use these same VLAN capabilities, found in both wired and wireless devices, to tag a... 

  • Wireless security: Knowledge is power

    Don't let Wi-Fi become the weak link in your network's armor! Learn the business risks posed by wireless, essential countermeasures that can reduce those risks, and industry best practices for designing, deploying and monitoring secure WLANs. 

  • Wi-Fi vulnerability assessment checklist

    Vulnerability assessments can help you find and fix WLAN weaknesses before attackers take advantage of them. But where do you start? What should you look for? Have you covered all the bases? This checklist will help to answer these questions. 

  • Defeating Evil Twin attacks

    Evil Twins pose a clear and present danger to wireless users on public and private WLANs. This tip describes steps that you can take to defend users against this poorly-understood attack. Learn why SSL or SSH may not be enough to protect your users a... 

  • Wireless attacks, A to Z

    In our buzzword-filled industry, wrapping your arms around wireless attacks and their potential business impacts can be tough. This tip tries to bring order to this chaos by providing a reference list of attacks against 802.11 and 802.1X, categorized... 

  • Recipe for rogue hunting

    Detecting rogues is fairly easy, but eliminating them can be surprisingly tough. This tip describes a methodical rogue hunting process and tools that can help. 

  • See more Essential Knowledge on Wireless Network Security: Setup, Issues and Threats
About Wireless Network Security: Setup, Issues and Threats

Get advice and information on how to build and setup wireless network security to avoid wireless security issues and threats like hacking. Prevent network problems and learn how to securely set up your wireless network.