X
Business

Already complex enough, wireless security schemes get more complex

When our wireless security guru George Ou originally published his take on Gartner's recently issued recommendations regarding some new WiFi Alliance-ratified wireless security specifications, I contacted him to say I was lost in the acronym soup and asked if he wouldn't mind rewriting his post to include some more explanatory text and clarifications.  So he did.
Written by David Berlind, Inactive
When our wireless security guru George Ou originally published his take on Gartner's recently issued recommendations regarding some new WiFi Alliance-ratified wireless security specifications, I contacted him to say I was lost in the acronym soup and asked if he wouldn't mind rewriting his post to include some more explanatory text and clarifications.  So he did.  In an attempt to simplify an almost impossible-to-simplify subject, Ou even broke out a second post that contrasts and compares the five different protocols from which to choose for securing your wireless networks, all of which are supported by the Wi-Fi Alliance under two separate wireless security schemes called WPA and WPA2.  Sound confusing?  It is. So much so that even the press had difficulty making heads or tails out of Gartner's recommendations on the new security schemes and Windows' support for them (understandably so).   As Ou points out, while Windows XP may not yet support all of the newly "ratified" protocols (there was no way it could, given the relative timing of Microsoft's last wireless security update and the Wi-Fi Alliance's newly issued specifications), the wireless security protocols that it does support are more than adequate.
Editorial standards