At the WLPC Conference in Phoenix a few weeks ago, I gave a short 30-minute talk on how and why to upgrade to WPA3 Security for business networks. Click the image in the...
Playlist - Wireless Security Architecture
Chapter 5 of the book is all about Planning and Design for Secure Wireless, with a strong emphasis on Wi-Fi. Here's an overview of the chapter, along with the highly...
WiFi security just saw its first meaningful update in 15 years. Here's what you need to know about WPA3, its security features, comparison to WPA2, and migration options.
There are only 3 types of WiFi SSID security profiles in enterprise networks. This article explains the often misleading characteristics of Personal, Enterprise, and...
This deep dive will explain filtering and segmentation, explore ways to enforce segmentation, and become familiar with the relationship of those options to our wireless...
Required for security and compliance, segmentation is a major architecture element of a secure wireless network. Here's an overview of when, why, and how to properly...
How to design architecture for enterprise wireless security [Free book excerpt]
You can access content from Chapter 5 "Planning and Design for Secure Wireless", and learn my 5-phase design methodology for wireless network and security.
Join me as I talk and walk through what's inside my latest book in this chapter-by-chapter quick peek at the top content and what to look for!
Implementing wireless security in the enterprise [TechTarget Interview]
Learn how to properly secure your enterprise wireless network while considering UX, zero trust and commonly overlooked architectural mistakes. Download a free excerpt...
Every enterprise organization will be impacted by one or more of three key wireless trends in the next 18 months -- and it's not all about Wi-Fi.