Has Security Arrived for WiFi?
by Dave Odom, CISSP Dave Odom discusses 802.11i and how it affects security in WLANs. Download White Paper VENDOR netForensics, Inc.: Winning the Battle Against Inside Threats: Actionable Strategies for Safeguarding Critical Data Today’s headlines confirm the potential outcomes of ineffective IT security systems. Companies are suffering serious consequences – from stolen customer data and intellectual property to powerful viruses and other malware. Not only are business operations interrupted, but corporate security failures are leading to damaged business reputations, lost revenues, sizeable costs, and often lost jobs for individuals held accountable. Download White Paper VENDOR Secure Computing Corporation: Seven Design Requirements for Web 2.0 Threat Prevention The rapid adoption of Web 2.0 applications has opened up the enterprise to new security threats that are not stopped by the widely deployed Web and messaging security solutions currently in place. Addressing Web 2.0 threats r