Year of the Horse: Wi-Fi and Security Thought Leadership

2014 Year of the Horse

In the 1st part of a 2 part blog series, we reflect on the Year of the Horse and 2014. In the second installment, we look ahead to 2015 and the Year of the Goat.   Read more

Wire-Side Containment – Hidden Gem of Rogue Access Point Protection

Wire-Side Containment - the Hidden Gem of Rogue Access Point Protection | by Hemant Chaskar via Airtight blog

The FCC’s decision to fine Marriott Hotels for unscrupulous Wi-Fi containment practices has set off numerous debates around the use of unlicensed spectrum. Many in the WLAN community have posted their interpretation of the decision and recommended best practices moving forward (see references below). Twitter debates have abounded as well. These parleys have focused on topics ranging from performance, to security, and monetization.
That being said, in the domain of security and PCI compliance, there is one Wi-Fi containment feature that hasn’t been mentioned, but deserves a shout-out as it is still very effective and virtually unperturbed by these events. It is called “wire-side containment”.   Read more

What Facebook friends info is shared during social login, and does it spam them?

Social Media Security

Will my friends get spam if I use Facebook social login? What information about my friends will be shared? These questions come to many when faced with the Facebook login option on websites and captive portals. This post seeks to answer these questions from the technical standpoint.

Graph API is the Facebook’s API that enables apps to read and write to the Facebook social graph. The discussion here is with respect to the API version 2.0 (released in April 2014) and later versions. To leverage the Graph API, there first needs to be a Facebook app. The app can be easily created in any Facebook account from the menu options. By default, apps can access the social login user’s public profile, email and friends list in the Facebook social graph. For access to additional information, the app needs to go through review and vetting process with Facebook. For illustrative purposes, let’s take the example of a consumer facing business that creates an app called “Da Brand” with default access rights.   Read more

Riddle for Wireless Field Day 7 Delegates: What am I?

Mojo Moonshine

Following are seven clues to help the delegates resolve this Wireless Field Day 7 riddle.

1) It is personalized

2) There is one for each day of the week

3) Helps you relax

4) Smooth and sweet

5) Travel size

6) Better than a t-shirt

7) Works like magic

The answer to this Wi-Fi brain teaser will be unveiled during AirTight’s #WFD7 segment. Addition insight can be found in Wireless Field Day: Are you ready for Lucky Number 7? As a viewer tuning in, you’ll be able to see which of the delegates manages to solve AirTight’s #WFD7 riddle. More on AirTight via TechFieldDay archive.   Read more

Wireless Field Day: Are you ready for Lucky Number 7?

Wireless Field Day 7

Wireless Field Day 7 (#WFD7) is just around the corner and AirTight Networks is pumped about being in the vendor line-up. This is our third WFD and certainly won’t be our last.

You won’t want to miss our session which takes place on Wednesday, August 6 from 13:30-15:30 (Pacific time). Most vendor presentations – including ours – are streamed live at TechFieldDay.com

Can’t make it for the live session? Keep calm and view video recordings of our presentations at your convenience.   Read more

Social Wi-Fi and Privacy: Keeping Balance in the Force

digital blue

I read with interest Lee Badman’s article in Network Computing: Social WiFi Sign-In: Benefits With A Dark Side. Despite the gloomy title, the article is a fair and balanced look at both benefits and privacy implications of social Wi-Fi. Perfect timing, I said to myself. Facebook just announced that they will be adding new functionality… Read More

Hunting down the cost factors in the cloud Wi-Fi management plane

Cost

Mature cloud Wi-Fi offerings have gone through few phases already. They started with bare-bones device configuration from the cloud console and over the years matured into meaty management plane for complete Wi-Fi access, security and complementary services in the cloud. Alongside these phases of evolution, optimizing the cost of operation of the cloud backend has always been important consideration. It is critical for cloud operators and… Read More