Search
Securing K-12 WiFi - A Scary Movie Blog
Posted by Louise Peter on Oct 31, 2017

It is a classic urban legend horror scene - a young woman is home alone (she is usually a babysitter). She receives creepy phone calls asking "Have you checked the kids?" The babysitter calls the police and the police set up watch outside the house to keep the babysitter safe. The police trace the phone calls and to their horror, they discover that the calls are not coming from another location, but they are coming from inside the house.

Recent Posts

Posts by Topic

see all
free-on-demand-webinars.png
Do You Have the Right Network Security Strategy?
Posted by Sean Blanton on Mar 28, 2016

A network-focused strategy for wireless security is the conventional wisdom, but is it really the right one? In our next webinar (Wednesday, March 30th, at 8:00 am PST), I’ll argue that a client-focused strategy is best.

What You Need to Know about 5 Cloud-Managed Wi-Fi Myths
Posted by Sriram Venkiteswaran on Sep 17, 2015

Any technology often sparks lengthy discussions, questions, and tends to summon some common misconceptions that can and should be disproven. Cloud Wi-Fi is no exception to this. I want to share some of the most common myths about cloud Wi-Fi that I’ve seen and show you why they are not reality.

Presidio Partners: "Why We Like AirTight"
Posted by Freddy Mangum on Jul 21, 2015

At Presidio Partners, we strongly believe in the power of technology, innovation, and data to push our entrepreneurs and ourselves in ways that will make the world a better place and help us meet ever-changing societal challenges. This view informs our pursuit of investment opportunities with young, growing companies.

Visit AirTight at ISTE 2015 - Booth 3161
Posted by Sean Blanton on Jun 28, 2015

Elevate the classroom experience with AirTight Secure Cloud Wi-Fi

10 Lessons for Retailers from Recent Security Reports
Posted by Freddy Mangum on Jun 16, 2015

Recent security reports from Verizon and new data from Mary Meeker of Kleiner Perkins Caufield & Byers have important security lessons for retailers. This blog summarizes key findings from these two widely respected sources.

PCI Compliance and Wi-Fi: Friends or Foes?
Posted by Robert Ferruolo (Dr. RF) on May 28, 2015

This is part three of our blog series dedicated to wireless PCI compliance; in this installment we focus on deployment best practices and common misconceptions. Read part 1: New PCI 3.1 Guidelines Address SSL Vulnerability and part 2: 3 Trends Impacting Wireless PCI Compliance

3 Trends Impacting Wireless PCI Compliance
Posted by AirTightTeam on May 21, 2015

This is part two of the three-part blog series dedicated to wireless PCI compliance, which is a hot topic for retailers and other enterprises that accept payment cards. Read part 1 of the series: New PCI 3.1 Guidelines Address SSL Vulnerability; part 3: PCI Compliance and Wi-Fi: Friends or Foes?

New PCI 3.1 Guidelines Address SSL Vulnerability
Posted by AirTightTeam on Apr 23, 2015

On April 15, the PCI Security Standards Council (PCI SSC) published PCI Data Security Standard (PCI DSS) Version 3.1 and supporting guidance. The revision addresses vulnerabilities within the Secure Sockets Layer (SSL) encryption protocol that can put payment data at risk.

AirTight at Wireless LAN Professionals Conference WLPC in Dallas
Posted by Sean Blanton on Mar 1, 2015

The Wireless LAN Professionals Conference is the brain child of Keith R Parsons - certified Wireless LAN professional, consultant and teacher. The conference consists of two days of fun, great topics, awesome gear, and wonderful networking. It features presentations from a vast array of experts in the field. The event is designed with two track sessions and short powerful talks called Ten Talks.