Application Security Architecture Authentication
CertificationsCorporate ComplianceCryptology
Disaster RecoveryEnterprise SecurityExploits
FirewallsIncident HandlingIntrusion Detection
OS SecurityPolicies and ProceduresSecurity Basics
Security ManagementSecurity ToolsServers
StandardsVoIPVulnerability Management
Web SecurityWiFi SecurityWorms and Viruses

5G radio access – capabilities and technologies

by Ericsson

The capabilities of 5G wireless access must extend far beyond previous generations of mobile communication. Examples of these capabilities include very high data rates, very low latency, ultra-high reliability, energy efficiency and extreme device densities, and will be realized by the development of LTE in combination with new radio-access technologies. Key technology components include extension to higher frequency bands, access/backhaul integration, device-to-device communication, flexible duplex, flexible spectrum usage, multi-antenna transmission, ultra-lean design, and user/control separation.
» Read more

Managing Security Risks in Wireless Networks

WiFiNetwork

by Michelle Sellers

This is 2017 and wireless networks are an important part of the structure in nearly every business. Unfortunately they are also a large vector for attackers to compromise vulnerabilities in a system that hasn’t been secured properly. This whitepaper will discuss the inherent vulnerabilities of a wireless network and ways to manage and mitigate these risks properly.
» Read more