Search
Securing K-12 WiFi - A Scary Movie Blog
Posted by Louise Peter on Oct 31, 2017

It is a classic urban legend horror scene - a young woman is home alone (she is usually a babysitter). She receives creepy phone calls asking "Have you checked the kids?" The babysitter calls the police and the police set up watch outside the house to keep the babysitter safe. The police trace the phone calls and to their horror, they discover that the calls are not coming from another location, but they are coming from inside the house.

Recent Posts

Posts by Topic

see all
free-on-demand-webinars.png
half-secure.png
The Half-Truth of SSAE 16 Certified Data Centers
Posted by Hemant Chaskar on Aug 17, 2016

To assure customers about security, vendors of cloud managed WiFi often tell their customers that they use “SSAE 16 certified data centers.” It is essential to drill down into this claim, else it stands the risk of being a half-truth, and as Mark Twain once said, “A half-truth is the most cowardly of lies.”

Three Security Scans that Cloud Networking Vendors Must Do for You
Posted by Hemant Chaskar on Apr 20, 2016

Early adopters of cloud managed networking (WiFi in particular) cited simplicity of deployment, ease of management, and favorable economics as key benefits of this architecture. While these benefits continue to hold true and improve by the year, I now see increasing awareness among customers about the security posture of the cloud. Part of the reason may be that cloud networking architecture is now transcending from niche to mainstream, even encompassing bigger enterprises and large service providers. As this happens, there are a growing number of cases where security departments in organizations weigh in on major infrastructure decisions.

Five Security Aspects Important for Cloud Managed Networking
Posted by Hemant Chaskar on Apr 5, 2016

Early adopters of cloud managed networking (WiFi in particular) cited simplicity of deployment, ease of operation, and favorable economics as key benefits. These benefits have proven themselves over years for many organizations, but of late I have seen a new consideration coming to the forefront: security of the cloud.