Search
A Mojo Customer Story: Universidad Alfonso X El Sabio (UAX)
Posted by Cherie Martin on May 22, 2017

Capture-1.pngToday’s learning environments are evolving and growing at a rapid pace, with more students & faculty accessing and sharing online content than ever before.  For many schools, it is a balancing act to meet the demand for ever-increasing bandwidth on a secure network utilizing fixed budgets and existing IT staffing levels.  

Posts by Topic

see all
free-on-demand-webinars.png
Year of the Horse: Wi-Fi and Security Thought Leadership
Posted by AirTightTeam on Feb 26, 2015

In many Asian countries, the New Year is based on the lunar calendar and is dictated by the first new moon and ends on the full moon. In the case of the Chinese calendar, each New Year is marked by the characteristics of one of the 12 zodiacal animals: the rat, ox, tiger, rabbit, dragon, snake, horse, sheep, monkey, rooster, dog and pig.

How Long Will Wi-Fi Protect You from Carrier Monetization Programs?
Posted by AirTightTeam on Nov 13, 2014

In the last couple of weeks, several reports on carriers’ plans and practices to track and analyze their mobile web traffic caught the attention of consumers and privacy watchers.

The Hunt for Rogue October
Posted by Rick Farina on Oct 30, 2014

Recently, I was invited to speak on Wi-Fi security at Wireless LAN Professionals Conference Europe in Maastricht, Netherlands. Excited about my first trip to the Netherlands, I quickly said yes and off I went. After meeting up with my co-worker, we arrived the evening before the conference to relax and check in. As a vendor neutral conference, the only Wi-Fi available was offered by the hotel (free!). On night one, we enjoyed some conversation with a few of our peers, and retired early to catch up on email (and sleep).

Wire-Side Containment - Hidden Gem of Rogue Access Point Protection
Posted by Hemant Chaskar on Oct 16, 2014

The FCC’s decision to impose a fine on Marriott Hotels for unscrupulous Wi-Fi containment has set off numerous debates. Many in the WLAN community have opined on its implications for the use of unlicensed spectrum (see references below and follow Twitter discussion on the topic). These parleys have touched upon performance impact, security challenges and Wi-Fi monetization practices.

SMBs, WEP still a target for War Drivers
Posted by Mike on May 9, 2011

After the TJX breach, the PCI security council strengthened their wireless security standard in an attempt to prevent such catastrophic incidents from reoccurring. While some of the largest retailers strengthened their wireless security, small and medium businesses need to take a look at their own security practices because they are just as susceptible, maybe more. In its annual Data Breach Investigations Report earlier this week, Verizon said "criminals are increasingly hitting smaller businesses as it becomes harder to steal financial data from big companies."

Are smartphones outsmarting your network security?
Posted by Mike on Apr 1, 2011

If you are concerned about the proliferation of smart devices (Iphones, Droids, tablets) and the impact on your network security, then this is a "can't miss" webinar. The inability to detect and block unauthorized personal devices from attaching to your network puts your business at risk. AirTight CTO and Founder Pravin Bhawat discusses the challenges with mobile device management and the limitations of existing wireless network security measures.

Goodbye, WEP & TKIP
Posted by Gopinath K N on Jun 18, 2010

Wi-Fi Alliance has (finally) decided to take some giant steps in improving the state of wireless security. Starting Jan 2011, TKIP will be disallowed on new APs and from 2012, it will be disallowed on all Wi-Fi devices. Come Jan 2013, WEP will not be allowed on new APs and from 2014, WEP will be disallowed on all Wi-Fi devices. This is the good news. But, let us also get to the “bad” news.

Humpty Dumpty sat on a wall...
Posted by Kaustubh Phanse on Mar 16, 2010

Every now and then we run into network administrators and CSOs that brag about how their organization is not vulnerable to wireless security threats, only to see their rash confidence fizzle out once the results from a wireless vulnerability assessment or penetration test are out.

Today, most are aware that Open WiFi on enterprise network is foolish and using WEP encryption is a bad idea and that WPA2/802.1x is the way to go. Then where do they go wrong?

Why Wireless Handheld Audits Do Not Equal Security
Posted by AirTightTeam on Apr 15, 2009

Introduction

Wireless security audits play a crucial role in the wireless vulnerability assessment of IT infrastructure and provide guidance on how organizations can meet regulatory wireless compliance requirements. Assessment of wireless vulnerabilities is challenging because of the dynamic nature of wireless environments. Auditors have to worry about not only the wireless devices in a network environment that is being audited, but also external wireless devices in the vicinity that can impact the susceptibility of the network in question to vulnerabilities and attacks. Wireless laptops, handhelds, and smartphones carried by business travelers can also get infected with vulnerabilities on the road; even organizations that may not have officially deployed a wireless LAN need to be aware of these threats.