Quantcast
Channel: Motorola Solutions Communities : Blog List - Wireless Security
Browsing all 10 articles
Browse latest View live

CSI Conference 2010 Report - Friday, Oct. 29 - Part I

The CSI Conference has been great this year. I think there are far more vendors than last year, and the attendees seem very in tune with the breakout sessions. Yesterday I presented on "Responding to a...

View Article



CSI Conference 2010 Report - Friday, Oct. 29 - Part II

CSI Conference 2010 - Compliance does not equal Security We've heard this many times, but Jim Jaeger has personal experience investigating many of the world's most notable breaches including TJX. Nice...

View Article

Healthcare industry seems to ignore the impact of security breaches

It would seem to me that an estimated six figure cost per patient (customer?) the industry would want to close this gap quickly....

View Article

Why Part-time Scanning Is Not Adequate for Securing Your WLAN

The industry has established the importance of having a dedicated wireless monitoring solution, to provide the best network security. So why are some WLAN vendors still encouraging the implementation...

View Article

Is WiFi Hacking Now Legal?

Since most administrators understand data protection, privacy and performance issues, why is the anonymous use of your network a current topic? It has resurfaced due to a recent court ruling in the...

View Article


Security Starts at theTop

A series of high-profile breaches have again thrust enterprise security practices into the spotlight. In recent weeks, hackers made the news with attacks on the gaming networks of Sony PlayStation,...

View Article

Do I Know You?

The goal of making the Internet safer for users like you and me took another step in the right direction with last week’s announcement of Secure DNS, a new technology for ensuring secure communications...

View Article

What's in a name?

What a difference the passage of time makes. It’s a subject we can all relate to because our perspective on things tends to change over time and sometimes associations change as well. Take a step back...

View Article


Hacking the Hackers

Hacker conferences are pretty interesting. The two big conferences, DEFCON and Black Hat, serve as a platform for hackers to get together, discuss their craft, party like rock stars, and occasionally...

View Article


To Catch a Rogue

We’ve really seen WLAN use explode over the last few years for use in a wide range of businesses. Enterprises use WLANs for their convenience, speed and security and to help deliver the mobile data,...

View Article
Browsing all 10 articles
Browse latest View live




Latest Images