Wednesday May 24

Posts Tagged ‘wireless security’

Mar
23/15
InfoSec World- Best, Worst and Common Practices for Securing Enterprise WiFi
Last Updated on Monday, 23 March 2015 12:00
Written by jj
Monday, March 23rd, 2015
Share

The afternoon of Monday, March 23rd at InfoSec World in Orlando, I’ll be giving a talk in the mobile track titled “Best, Worst and Common Practices for Securing Enterprise WiFi“. Since the event site doesn’t post the full abstract, I figured I’d share it here for you, and I’ll tweet the crap out of it so you can find it. (more…)

Tags: , , ,   |  Posted under Events  |  Comments  1 Comment
Feb
14/11
JJ’s RSA Session: Jumping Wireless Hurdles in the Enterprise
Last Updated on Tuesday, 31 January 2012 03:53
Written by jj
Monday, February 14th, 2011
Share

Hi everyone,

Long time, no blog. I know. But, I wanted to let you know I’ll be at RSA this week. Just in case you didn’t dig through the hundreds of sessions at RSA and realize I’d be hosting a Peer2Peer, here’s the info for you! (more…)

Tags: , ,   |  Posted under Events, Wireless  |  Comments  1 Comment
Jul
30/10
Analysis after the demo: Hole 196 and the WPA2 vulnerability
Last Updated on Tuesday, 31 January 2012 01:10
Written by jj
Friday, July 30th, 2010
Share

You guys asked me to break out this information instead of posting as comments on the original post.

Here is more updated information on the WPA2 Hole 196 vulnerability now that AirTight has given the demo at BlackHat/Defcon. (more…)

Jul
23/10
Smoke and Mirrors? The Upcoming Defcon WPA2 Crack
Last Updated on Tuesday, 31 January 2012 01:12
Written by jj
Friday, July 23rd, 2010
Share

Okay folks. A lot of people have asked me about this over the past two days, so here’s my response on the WPA2 vulnerability that’s to be announced at BlackHat and Defcon next week. (more…)

Dec
04/09
Four Options for Secure Wireless Authentication with 802.1X
Last Updated on Tuesday, 31 January 2012 02:10
Written by jj
Friday, December 4th, 2009
Share

The use of 802.1X in wireless is currently the most widely accepted method for secure authentication and key exchange in enterprise environments. (more…)

More Content

Find more of my content at
- Low Tech Hacking book
- Dark Reading
- Network Computing
- IANS
- SearchSecurity
- TechTarget

Get Social

RSSFacebookLinkedinYoutube

Subscribe

Enter your email address:

Delivered by FeedBurner

NetworkedBlogs