Feeds

Cisco and MS team on wireless security

Yeah, verily laptop shall speak unto laptop, securely

  • alert
  • submit to reddit

Internet Security Threat Report 2014

Cisco has announced what it says is the first implementation of a draft security standard for wireless networking.

The networking giant collaborated with Microsoft to develop, deliver and deploy the first enterprise authentication and security architecture based on the draft IEEE 802.1x and Extensible Authentication Protocol (EAP) standard.

EAP is designed to allow wireless client adapter manufacturers and RADIUS server vendors to independently develop interoperable client side and server side security software.

The idea for the IEEE 802.1x standard, which deals with port-based network access control, is to allow enterprises to scale the deployment of wireless networks while still having centralised security management. It provides functions such as centralised user identification, authentication, dynamic key management and accounting.

IEEE 802.1x is positioned as providing simplified administration compared to systems which use static Wired Equivalent Privacy (WEP) key management.

Microsoft is Cisco's largest wireless LAN enterprise customer and the networking firm sees it collaboration with them as a proving ground for securing enterprise wireless networks.

It's well known that wireless security is pretty flaky and concerns about WEP were highlighted in research by University of California at Berkeley and security vendor Zero Knowledge Systems, which showed ways in which wireless LAN traffic could be intercepted.

Work on beefing up the security of wireless is welcome but we'd be more confident if a large bank, which would have an instinctive understanding of security, was used as a proving ground for wireless security rather than Microsoft, notwithstanding its up close and personal experience of hacking last year.

Support for the standard will now be included in Cisco's Aironet 350 Series of Wi-Fi (IEEE 802.11b) compliant wireless local area networking (WLAN) products, which are currently shipping. ®

External links

Security of the WEP algorithm
Cisco and Microsoft team on wireless security (press release)

Internet Security Threat Report 2014

More from The Register

next story
Knock Knock tool makes a joke of Mac AV
Yes, we know Macs 'don't get viruses', but when they do this code'll spot 'em
Feds seek potential 'second Snowden' gov doc leaker – report
Hang on, Ed wasn't here when we compiled THIS document
Why weasel words might not work for Whisper
CEO suspends editor but privacy questions remain
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
BlackEnergy crimeware coursing through US control systems
US CERT says three flavours of control kit are under attack
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
Protecting against web application threats using SSL
SSL encryption can protect server‐to‐server communications, client devices, cloud resources, and other endpoints in order to help prevent the risk of data loss and losing customer trust.