"How Wireless Intruders Can Bypass NAC Controls"
According to Gabriel Ryan, a security engineer at Gotham Digital Science, the utilization of port-based network access control (NAC) devices is still insufficient in protecting an organization’s wireless network if EAP-TLS wireless security is not implemented. Organizations use NAC devices to quarantine attackers that have intruded into their wireless network. This article further discusses why many companies rely on NAC appliances, why this method is still inadequate in protecting an enterprise’s wireless network, and two attacks that will be demonstrated by Gabriel Ryan that will further emphasize the insufficiency of NAC controls.
Dark Reading reports "How Wireless Intruders Can Bypass NAC Controls"
Submitted by Anonymous
on