There are two official ESSIDs to access the conference network: the encrypted and cert/user-based authentication (DefCon) and the unencrypted free-for-all one (DefCon-Open): choose wisely. Most of the devices these days should are 802.1x compatible, despite the corks some of them still present without an MDM solution behind it, and no one really want your managed devices. If you attended DEFCON 23 let us know your thoughts here at the Cloud and Cyber Security Center.
News, products, vendors, threats, training and publications for cloud and cyber security.
Security Software & Equipment Store
Tuesday, August 11, 2015
DEFCON 23 Concludes: Who has the Advantage - Hackers or their Targets?
There are two official ESSIDs to access the conference network: the encrypted and cert/user-based authentication (DefCon) and the unencrypted free-for-all one (DefCon-Open): choose wisely. Most of the devices these days should are 802.1x compatible, despite the corks some of them still present without an MDM solution behind it, and no one really want your managed devices. If you attended DEFCON 23 let us know your thoughts here at the Cloud and Cyber Security Center.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment