Recents security reports from Verizon and new data from Mary Meeker of Kleiner Perkins Caufield Byers have important security lessons for retailers. Read on for 10 key things you can learn. Read more
In part 3 of the wireless PCI blog series, we focus on deployment best practices and common misconceptions when it comes to PCI compliance and Wi-Fi. Read more
This is part two of the three-part blog series dedicated to wireless PCI, which is a hot topic for retailers and other enterprises that accept payment cards. We look at 802.11ac, IoT and new network requirements, all of which create challenges for compliance and security officers. But the impact is not limited to just security personnel. IT and marketing, while focused on efficiencies and customer engagement, should also learn about wireless threats and trends. Brand protection is a team effort!
Read on for the in-depth look into the trends that impact wireless PCI compliance.
In April 2015, the PCI Security Standards Council (PCI SSC) published PCI Data Security Standard (PCI DSS) Version 3.1 and supporting guidance. The revision addresses vulnerabilities within the Secure Sockets Layer (SSL) encryption protocol that can put payment data at risk. This blog explains what this change represents to you and your business. Includes 2 whitepapers and 1 infographic. Read more
In the 1st part of a 2 part blog series, we reflect on the Year of the Horse and 2014. In the second installment, we look ahead to 2015 and the Year of the Goat. Read more
All indications are that 2015 will be a banner year! Stay tuned for new technology developments in Wi-Fi and see what AirTight brings out in the coming year. Read more
Our security researchers recently took a look at Apple’s iOS8 MAC randomization feature. It was touted by Apple for its ability to protect consumer privacy from persistent Wi-Fi tracking, but turned out to be of limited usability as currently implemented. With all the interest in privacy features, we thought we’d give you a look at what’s ‘under the hood’ in retail Wi-Fi analytics in our upcoming webinar (available on-demand). Read more
Choose your wireless network carefully. Cloud and APs are not all created equal.
Clearly we’re not in Kansas anymore … According to IDC, the growing global Internet of Things (IoT) market is on course to hit $7.1 trillion by 2020. With the rapid rise of connected devices in the IoT landscape there is growing concern about elevated security risks associated with the sheer volume of new devices coming online. AirTight can help you plan for IoT capacity and network traffic, as well as optimal secure coverage across your site. Read more
The FCC’s decision to fine Marriott Hotels for unscrupulous Wi-Fi containment practices has set off numerous debates around the use of unlicensed spectrum. Many in the WLAN community have posted their interpretation of the decision and recommended best practices moving forward (see references below). Twitter debates have abounded as well. These parleys have focused on topics ranging from performance, to security, and monetization.
That being said, in the domain of security and PCI compliance, there is one Wi-Fi containment feature that hasn’t been mentioned, but deserves a shout-out as it is still very effective and virtually unperturbed by these events. It is called “wire-side containment”. Read more
Did 2013 have to end with the somber news of a big credit card security breach? But it did! It is reported that 40 million credit cards were compromised in the security breach in stores of a major U.S. retailer Target. This is only a shade second to the earlier TJX breach in which 45 million credit cards… Read More