The anatomy of a covert wireless security assessment
Maybe Iím a little old for it, but I do enjoy the change of pace a big wireless security penetration project provides. Once or twice a year, I get to put down my thrill-a-minute governance frameworks, quit rockiní out policy advice, and make like the black hats for a week or two.
There area few differences between this sort of project and the usual network security assessment. It also prompts a lot of questions from clients, peers and curious IT staff, most likely because it looks like a lot of fun. For the most part, it is.
[ Read more ]