Recents security reports from Verizon and new data from Mary Meeker of Kleiner Perkins Caufield Byers have important security lessons for retailers. Read on for 10 key things you can learn. Read more
In April 2015, the PCI Security Standards Council (PCI SSC) published PCI Data Security Standard (PCI DSS) Version 3.1 and supporting guidance. The revision addresses vulnerabilities within the Secure Sockets Layer (SSL) encryption protocol that can put payment data at risk. This blog explains what this change represents to you and your business. Includes 2 whitepapers and 1 infographic. Read more
In many Asian countries, the New Year is based on the lunar calendar and is dictated by the first new moon and ends on the full moon. In the case of the Chinese calendar, each New Year is marked by the characteristics of one of the 12 zodiacal animals: the rat, ox, tiger, rabbit, dragon, snake, horse, sheep, monkey, rooster, dog and pig.
In the first part of a 2 part blog series, we started off by reflecting on the Year of the Horse and 2014. In this second installment, we look ahead to the Year of the Goat which began on February 19th 2015. Read more
AirTight had strong representation at the Dallas conference (February 2015) with 2 keynote sessions and 4 Ten Talks. View the video and SlideShare archive. Read more
In the 1st part of a 2 part blog series, we reflect on the Year of the Horse and 2014. In the second installment, we look ahead to 2015 and the Year of the Goat. Read more
Rick Farina describes his Wi-Fi investigations at Wireless LAN Professionals Conference Europe in Maastricht, Netherlands 2014. WIPS Read more
Choose your wireless network carefully. Cloud and APs are not all created equal.
Clearly we’re not in Kansas anymore … According to IDC, the growing global Internet of Things (IoT) market is on course to hit $7.1 trillion by 2020. With the rapid rise of connected devices in the IoT landscape there is growing concern about elevated security risks associated with the sheer volume of new devices coming online. AirTight can help you plan for IoT capacity and network traffic, as well as optimal secure coverage across your site. Read more
The FCC’s decision to fine Marriott Hotels for unscrupulous Wi-Fi containment practices has set off numerous debates around the use of unlicensed spectrum. Many in the WLAN community have posted their interpretation of the decision and recommended best practices moving forward (see references below). Twitter debates have abounded as well. These parleys have focused on topics ranging from performance, to security, and monetization.
That being said, in the domain of security and PCI compliance, there is one Wi-Fi containment feature that hasn’t been mentioned, but deserves a shout-out as it is still very effective and virtually unperturbed by these events. It is called “wire-side containment”. Read more
October 13-15 2014: Wireless LAN Professionals EU Summit #WLPC_EU | video archive available | Keith R. Parsons Read more
Implications for Public Facing Wi-Fi Security, Advertising and Analytics.
You may have already noticed – Google search has been strictly using HTTPS for some time now. Typically, you would not enter passwords in a keyword search and so people probably were not terribly worried about search sites not using HTTPS (Bing still allows HTTP). Nonetheless, Google has led by example by adopting strict HTTPS for search. With this, they have also demonstrated that HTTPS isn’t the bottleneck for transactions scalability of the site.
Additionally, just last month, Google disclosed that they will provide (slight) SEO rank incentives to HTTPS sites. If the trend picks up and most useful sites on the Internet move to HTTPS (news and other type of information distribution sites have the least penetration of HTTPS), it will impact public facing Wi-Fi in some interesting ways. Read more