The anatomy of a covert wireless security assessment
Maybe Iím a little old for it, but I do enjoy the change of pace a big wireless security penetration project provides. Once or twice a year, I get to put down my thrill-a-minute governance frameworks, quit rockiní out policy advice, and make like the black hats for a week or two.
There area few differences between this sort of project and the usual network security assessment. It also prompts a lot of questions from clients, peers and curious IT staff, most likely because it looks like a lot of fun. For the most part, it is.
[ Read more ]
By subscribing to our early morning news update, you will receive a daily digest of the latest security news published on Help Net Security.
With over 500 issues so far, reading our newsletter every Monday morning will keep you up-to-date with security risks out there.