Organizations using port-based network access control (NAC) devices to contain wireless intruders may be less secure than they assume. Unless an organization is using the most secure WPA2-EAP authentication, an attacker with an initial foothold on the enterprise wireless network can bypass the protections enabled by NAC appliances and pivot deeper into the enterprise. Read […]
Latest Comments