Monday Nov 20

Posts Tagged ‘802.1X-REV’

Sep
16/11
Trusted Infrastructure at NSA’s Trusted Computing Conference
Last Updated on Tuesday, 31 January 2012 12:31
Written by jj
Friday, September 16th, 2011
Share

Next week, I’ll be presenting on trusted infrastructure at the 2nd Annual NSA Trusted Computing Conference  in Orlando. This year’s focus is Using COTS technologies to deliver decisive defensive advantage. (more…)

Tags: , , , ,   |  Posted under Events, NAC & 802.1X  |  Comments  Comments Off on Trusted Infrastructure at NSA’s Trusted Computing Conference
Sep
16/11
802.1X-REV It’s a Cryptographic Come Back
Last Updated on Tuesday, 31 January 2012 12:32
Written by jj
Friday, September 16th, 2011
Share

The new 802.1X-2010 (formerly referred to here as 802.1X-REV) offers a multi-faceted approach to increasing integrity, availability and confidentiality throughout network infrastructures at every segment- from LANs and WLANs to WANs and MANs. Yeah, I threw out the I.A.C. triangle. As much as I hate using it, it is a foundational element of security. (more…)

Tags: , , ,   |  Posted under NAC & 802.1X  |  Comments  2 Comments
Sep
18/09
Catching the Unicorn: A technical exploration of why NAC is failing
Last Updated on Saturday, 28 January 2012 06:42
Written by jj
Friday, September 18th, 2009
Share

Catching the Unicorn:
A technical exploration of why NAC is failing (more…)

Oct
22/08
Securing Multiple Device Auth on 802.1X
Last Updated on Saturday, 28 January 2012 06:47
Written by jj
Wednesday, October 22nd, 2008
Share

Part II of the Clearing Up 802.1X Series
Securing Multiple Device Authentication on 802.1X

VLANs and Multiple Device Authentication
I always say the road to insecurity is paved with good intentions, and implementations of 802.1X are some of the best examples. I find folks tend to be so excited if-and-when they get 802.1X working, that they don’t bother to put it through the ringer and see what’s actually happening on the switch once it’s working. (more…)

Tags: , , , ,   |  Posted under NAC & 802.1X  |  Comments  9 Comments
Oct
22/08
Clearing Up 802.1X
Last Updated on Wednesday, 22 October 2008 11:21
Written by jj
Wednesday, October 22nd, 2008
Share

After much poking and prodding from various colleagues and customers, I’m finally hopping back on the blog train.

By this point everyone seems to refer to me as ‘The 1X geek’, probably because of my evangelical technical overviews and implementations of the standard. I s’pose because of this, in the past week several folks have asked me to check out recent articles by Mike Fratto (New Protocols Secure Layer 2, October 4) and follow up blog by Richard at Tao Security (Hop by Hop Encryption: Needed?) about 802.1X and the upcoming revision of the standard due in 2009.

I can tell you Mike always does his homework, and those of us interested in 1X get our technical details straight from the horse’s mouth, so to speak. Mike is no exception and I’m always comfortable referring readers to his blogs and articles for information.

To answer the questions I’ve received, I’ve put together a few bite-sized snippits of information on both the current 802.1X standard, its use with multiple device auth, its use with mixed authentication and the upcoming 802.1X-REV…

The Clearing Up 802.1X Series Begins…

 # # #

Tags: , , ,   |  Posted under NAC & 802.1X  |  Comments  2 Comments

More Content

Find more of my content at
- Low Tech Hacking book
- Dark Reading
- Network Computing
- IANS
- SearchSecurity
- TechTarget

Get Social

RSSFacebookLinkedinYoutube

Subscribe

Enter your email address:

Delivered by FeedBurner

NetworkedBlogs