Do As Security Pros Say, Not As They Do
Monitoring at the RSA Conference found plenty of security vulnerabilities on the wireless networks the security professionals were using.
Monitoring at the RSA Conference found plenty of security vulnerabilities on the wireless networks the security professionals were using.Who watches the watchers? According to word of some security vulnerabilities at last week's RSA conference, pretty much anybody who wants to, according to Motorola Airdefense.
Anybody, that is, who had the skills to tap into the ad hoc wireless networks that popped up during the conference.
Airfense's monitoring of wireless nets at the conference found 315 ad hoc networks, with over 60% of those running long-vulnerable WEP security protocol.
Benefit of the doubt seems appropriate here: My guess is that the majority of the security pros at RSA knew exactly what they were doing, trading the convenience of ad hoc access for the risks they took.
Question is, are they taking similar risks with your business networks? And if they're the ones with oversight of those networks, how would you know?
Read more about:
2010About the Author(s)
You May Also Like
Is AI Identifying Threats to Your Network?
May 14, 2024Where and Why Threat Intelligence Makes Sense for Your Enterprise Security Strategy
May 15, 2024Safeguarding Political Campaigns: Defending Against Mass Phishing Attacks
May 16, 2024Why Effective Asset Management is Critical to Enterprise Cybersecurity
May 21, 2024Finding Your Way on the Path to Zero Trust
May 22, 2024
Black Hat USA - August 3-8 - Learn More
August 3, 2024Cybersecurity's Hottest New Technologies: What You Need To Know
March 21, 2024