The anatomy of a covert wireless security assessment
Maybe I’m a little old for it, but I do enjoy the change of pace a big wireless security penetration project provides. Once or twice a year, I get to put down my thrill-a-minute governance frameworks, quit rockin’ out policy advice, and make like the black hats for a week or two.
There area few differences between this sort of project and the usual network security assessment. It also prompts a lot of questions from clients, peers and curious IT staff, most likely because it looks like a lot of fun. For the most part, it is.
[ Read more ]
Reading our newsletter every Monday will keep you up-to-date with security news.
Receive a daily digest of the latest security news.