The Latest in IT Security

How Wireless Intruders Can Bypass NAC Controls

01
Nov
2017
How Wireless Intruders Can Bypass NAC Controls

computer-1446131_960_720

Organizations using port-based network access control (NAC) devices to contain wireless intruders may be less secure than they assume.

Unless an organization is using the most secure WPA2-EAP authentication, an attacker with an initial foothold on the enterprise wireless network can bypass the protections enabled by NAC appliances and pivot deeper into the enterprise.

Read More

Leave a reply


Categories

WEDNESDAY, NOVEMBER 22, 2017

Featured

Archives

Latest Comments

Social Networks