<?xml version="1.0" encoding="UTF-8" ?><!-- generator=Zoho Sites --><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><atom:link href="https://www.viszensecurity.com/blogs/wireless-and-iot/feed" rel="self" type="application/rss+xml"/><title>Viszen Security - Insights , Wireless and IoT</title><description>Viszen Security - Insights , Wireless and IoT</description><link>https://www.viszensecurity.com/blogs/wireless-and-iot</link><lastBuildDate>Sun, 21 Dec 2025 06:48:44 -0800</lastBuildDate><generator>http://zoho.com/sites/</generator><item><title><![CDATA[NEW Training and Certification Mini-Event]]></title><link>https://www.viszensecurity.com/blogs/post/new-training-and-certification-mini-event</link><description><![CDATA[<img align="left" hspace="5" src="https://www.viszensecurity.com/Promo class images.png"/>New training for Wi-Fi, network, and security engineers for Wi-Fi 6E, Wi-Fi 7, WPA3, and new security.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_pBb97HkdSKyr3T7d2oDwkg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_uqyXACehRN-mj4XtMX_Kdg" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_8_FGqincTkCEwXDTdr8Smw" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_ix3HCB6VS3Ovh-UQA12Frg" data-element-type="heading" class="zpelement zpelem-heading "><style></style><h2
 class="zpheading zpheading-align-center " data-editor="true">The first Wireless Tech Summit</h2></div>
<div data-element-id="elm_J-OaVMm9Tva_kFd3SiHy6A" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-left " data-editor="true"><div style="color:inherit;"><p style="text-align:left;margin-bottom:24px;">This month (November 2024),&nbsp;<a href="https://www.linkedin.com/in/mackenziewifi" target="_blank" rel="noreferrer noopener">Peter Mackenzie</a>&nbsp;and I are co-hosting the first&nbsp;<a href="https://www.wirelesstechsummit.com/" target="_blank" rel="noreferrer noopener">Wireless Tech Summit</a>, a Wi-Fi training and certification mini-event. The best part? It will be in-person here in North Carolina!</p><p style="text-align:left;margin-bottom:24px;">Okay, maybe that’s not actually the&nbsp;<em>best&nbsp;</em>part. The&nbsp;<em>best&nbsp;</em>part is probably the concept overall. We wanted to give people access to training and peer connections they may not otherwise have, and do it at a critical time in Wi-Fi history.</p><p style="text-align:left;margin-bottom:24px;">The FCC has opened new spectrum so we’re managing 2.4Ghz, 5GHz, and now 6GHz with Wi-Fi 6E and Wi-Fi 7, and that has huge implications for both the design and security of our networks. Plus, Wi-Fi 6E and Wi-Fi 7 require WPA3 security and unfortunately, there’s no easy button for migrating from WPA2 to WPA3.</p><p style="text-align:left;margin-bottom:24px;">So, we thought we could get together, co-host a mini-event, and give people four days of training and certification coupled with peer networking and social events. Plus, some special joint labs, testing, and guest speakers to round it out!</p><p style="text-align:left;margin-bottom:24px;">It’s bigger than a training, and smaller than a conference. A way to maximize time and precious training budget without having to give up a weekend.</p><p style="text-align:left;margin-bottom:24px;">The&nbsp;<a href="https://www.wirelesstechsummit.com/" target="_blank" rel="noreferrer noopener">November 2024 event</a>&nbsp;offers a choice from two training classes:</p><ul><li style="text-align:left;"><a href="https://www.wirelesstechsummit.com/WirelessTechSummit2024#/wlandesignandhaminacourse">Wi-Fi Design and Hamina Certified Network Architect</a>&nbsp;with Peter Mackenzie</li><li style="text-align:left;"><a href="https://www.wirelesstechsummit.com/WirelessTechSummit2024#/securewifi">Secure Wi-Fi Architecture Masterclass</a>&nbsp;and Certification with me (Jennifer Minella) and Jonathan Davis</li></ul><p style="text-align:left;margin-bottom:24px;">All three of us are practitioners. Meaning, we teach only part time and the rest of our time is focused on doing the work related to our class content. The content is not only fresh and timely but also real-world and hyper applicable to the daily roles of engineers and architects.</p><p style="text-align:left;margin-bottom:24px;"><img src="/photos-2024wlpc-securewificlass-01.jpg" style="color:inherit;text-align:center;width:410.42px !important;height:310px !important;max-width:100% !important;">&nbsp; &nbsp; &nbsp;&nbsp;<img src="/Promo%20class%20images.png" style="color:inherit;width:310px !important;height:310px !important;max-width:100% !important;"></p><p style="text-align:left;margin-bottom:24px;"><span style="color:inherit;">Peter is arguably one of the best and most popular Wi-Fi instructors in the the world. He’s not only teaching the course, he developed it (and many others). You can find his full offering at&nbsp;</span><a href="https://www.mqts.co.uk/" target="_blank" rel="noreferrer noopener">MQ Training Services</a><span style="color:inherit;">, based out of the UK, including a suite of the&nbsp;</span><a href="https://www.mqts.co.uk/cwnp-training" target="_blank" rel="noreferrer noopener">CWNP courses</a><span style="color:inherit;">&nbsp;such as CWNA, CWDP, and CWAP.</span></p><p style="text-align:left;margin-bottom:24px;"><a href="https://www.linkedin.com/in/jonathanadavis/" target="_blank" rel="noreferrer noopener">Jonathan Davis (JD)</a>&nbsp;is also a CWNP-certified instructor and CWNE (Certified Wireless Network Expert) and brings deep Wi-Fi knowledge to our security architecture class, where I of course dive into the depths of security from technology to compliance.</p><p style="text-align:left;margin-bottom:24px;">As for me, well I’ve been doing network security for over 20 years and layer that with 15+ years deeply focused on more holistic security architecture addressing all aspects of security. The class is based on those 20 years of experience working with and in hundreds of client environments across all industries. It's also based in large part on my recent book, &quot;<span style="font-weight:bold;"><a href="https://www.amazon.com/Wireless-Security-Architecture-Maintaining-Enterprise/dp/1119883059">Wireless Security Architecture</a></span>&quot; published with Wiley.</p><p style="text-align:left;margin-bottom:24px;">Check out more class details on the event site, including videos. We’d love to have you join us at this or another upcoming event!</p><p style="text-align:left;margin-bottom:24px;">Also- be sure to&nbsp;<a href="https://www.linkedin.com/in/jenniferminella/" target="_blank" rel="noreferrer noopener">follow me on LinkedIn</a>&nbsp;for more regular updates.</p><p style="margin-bottom:24px;">Interested in future dates and/or corporate training for your team? <a href="/contact" title="Contact us!" rel="">Contact us!</a></p><p style="margin-bottom:24px;"></p><div style="text-align:left;"><span style="font-weight:700;color:inherit;">Wireless Tech Summit</span></div>
<div style="text-align:left;"><span style="color:inherit;">Training and Certification Mini-Event</span></div>
<div style="text-align:left;"><span style="color:inherit;">November 12-15, 2024</span></div>
<div style="text-align:left;"><span style="color:inherit;">Raleigh, NC, USA</span></div>
<div style="text-align:left;"><a href="https://www.wirelesstechsummit.com/" target="_blank" rel="noreferrer noopener">https://www.wirelesstechsummit.com/</a></div>
<p></p></div></div></div><div data-element-id="elm_QQr8RBxRROSw9_lilnfZnw" data-element-type="button" class="zpelement zpelem-button "><style></style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md " href="javascript:;" target="_blank"><span class="zpbutton-content">Get Started Now</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Fri, 01 Nov 2024 07:30:00 -0400</pubDate></item><item><title><![CDATA["Wireless Security Architecture" Now Shipping Worldwide]]></title><link>https://www.viszensecurity.com/blogs/post/wireless-security-architecture-now-shipping-worldwide</link><description><![CDATA[<img align="left" hspace="5" src="https://www.viszensecurity.com/Photo-book02.jpg"/>My new book published with Wiley, &quot;Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise&quot; is now shipping ]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_DiYKLAJtQ7yElPtO0u4Jkg" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_7KSGYmyvSFSKmPKxVYhFuA" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_IgiUHDdyQNiZuSBECgqJ5A" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_iLfcW_plTJ6vgE8-Okx-LQ" data-element-type="text" class="zpelement zpelem-text "><style></style><div class="zptext zptext-align-center " data-editor="true"><p>My new book published with Wiley, &quot;Wireless Security Architecture: Designing and Maintaining Secure Wireless for Enterprise&quot; is now shipping worldwide. Available as e-book and in print from Wiley, Amazon, and book retailers near you! <br></p></div>
</div><div data-element-id="elm_8Ix6v9kgQR6MNijyGsUJ6A" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_8Ix6v9kgQR6MNijyGsUJ6A"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://www.amazon.com/Wireless-Security-Architecture-Maintaining-Enterprise/dp/1119883059" target="_blank" title="Find on Amazon"><span class="zpbutton-content">Find on Amazon</span></a></div>
</div><div data-element-id="elm_M_leYe3JOIOyjWxz1tWjPw" data-element-type="imagetext" class="zpelement zpelem-imagetext "><style> @media (min-width: 992px) { [data-element-id="elm_M_leYe3JOIOyjWxz1tWjPw"] .zpimagetext-container figure img { width: 278.06px !important ; height: 202px !important ; } } @media (max-width: 991px) and (min-width: 768px) { [data-element-id="elm_M_leYe3JOIOyjWxz1tWjPw"] .zpimagetext-container figure img { width:278.06px ; height:202px ; } } @media (max-width: 767px) { [data-element-id="elm_M_leYe3JOIOyjWxz1tWjPw"] .zpimagetext-container figure img { width:278.06px ; height:202px ; } } [data-element-id="elm_M_leYe3JOIOyjWxz1tWjPw"].zpelem-imagetext{ border-radius:1px; } </style><div data-size-tablet="" data-size-mobile="" data-align="left" data-tablet-image-separate="false" data-mobile-image-separate="false" class="zpimagetext-container zpimage-with-text-container zpimage-align-left zpimage-size-custom zpimage-tablet-fallback-custom zpimage-mobile-fallback-custom hb-lightbox " data-lightbox-options="
            type:fullscreen,
            theme:dark"><figure role="none" class="zpimage-data-ref"><span class="zpimage-anchor" role="link" tabindex="0" aria-label="Open Lightbox" style="cursor:pointer;"><picture><img class="zpimage zpimage-style-none zpimage-space-none " src="/Photo-book02.jpg" width="278.06" height="202" loading="lazy" size="custom" data-lightbox="true"/></picture></span></figure><div class="zpimage-text zpimage-text-align-left " data-editor="true"><ul><li>More information, resources, and the full table of contents is available at my blog site at <a href="http://securityuncorked.com/books/" title="https://securityuncorked.com/books" target="_blank" rel="">https://securityuncorked</a><a href="http://securityuncorked.com/books/" title="https://securityuncorked.com/books" target="_blank" rel="">.com/books</a>.<br></li><li>Order from <a href="https://www.amazon.com/Wireless-Security-Architecture-Maintaining-Enterprise/dp/1119883059" title="Amazon" target="_blank" rel="">Amazon</a>. <br></li><li>Follow me on <a href="https://twitter.com/jjx" title="Twitter @jjx" target="_blank" rel="">Twitter @jjx</a> and the <a href="http://securityuncorked.com/" title="Security Uncorked blog" target="_blank" rel="">Security Uncorked blog</a> for more updates and giveaways. <br></li><li>Sign up for <a href="https://zc.vg/F4LNa" title="book-specific updates by email" target="_blank" rel="">book-specific updates by email</a>. Your information is never shared with third parites.</li></ul></div>
</div></div></div></div></div></div></div> ]]></content:encoded><pubDate>Tue, 12 Apr 2022 10:14:52 -0400</pubDate></item><item><title><![CDATA[Wireless Security Trends (CISO Network Security Cheat Sheet)]]></title><link>https://www.viszensecurity.com/blogs/post/wireless-security-trends-ciso-network-security-cheat-sheet</link><description><![CDATA[<img align="left" hspace="5" src="https://www.viszensecurity.com/blog-ciso-network-cheatsheet-wireless-security.jpg"/>A quick overview of 3 top trends in wireless security for CISOs and CIOs with a look at new WPA3 security, WiFi 6E, and CBRS/Private LTE/Private 5G with 1-3 key take-aways for each technology trend.]]></description><content:encoded><![CDATA[<div class="zpcontent-container blogpost-container "><div data-element-id="elm_Kv_ld3axSpiPWDOO1zYgOA" data-element-type="section" class="zpsection "><style type="text/css"></style><div class="zpcontainer-fluid zpcontainer"><div data-element-id="elm_rlM6SwVoSCGwd05C7KwcGQ" data-element-type="row" class="zprow zprow-container zpalign-items- zpjustify-content- " data-equal-column=""><style type="text/css"></style><div data-element-id="elm_Wei-9RUST3aO5l-gj3KtiA" data-element-type="column" class="zpelem-col zpcol-12 zpcol-md-12 zpcol-sm-12 zpalign-self- "><style type="text/css"></style><div data-element-id="elm_QoZEMFx-STiHS2yMu6rkQA" data-element-type="heading" class="zpelement zpelem-heading "><style> [data-element-id="elm_QoZEMFx-STiHS2yMu6rkQA"].zpelem-heading { border-radius:1px; } </style><h4
 class="zpheading zpheading-align-center " data-editor="true">Excerpt from Jen's presentation at ISSA Cyber Executive Forum<br></h4></div>
<div data-element-id="elm_JbceawaiTYiMUqnSvWvWVQ" data-element-type="text" class="zpelement zpelem-text "><style> [data-element-id="elm_JbceawaiTYiMUqnSvWvWVQ"].zpelem-text { border-radius:1px; } </style><div class="zptext zptext-align-left " data-editor="true"><span style="color:inherit;"><p style="text-align:left;"><span style="font-size:12pt;font-weight:400;">Last month, I delivered a whirlwind of a presentation hitting on today's and tomorrow's top network security trends CISOs should know about. The full content covered security trends in 3 areas: 1) Wireless, 2) Secure Edge, and 3) Operations. Today we're looking at the high level wireless security topics, and I'm just going to cover three so this doesn't turn in to a novel.&nbsp; </span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;font-weight:700;">1. WiFi WPA3 </span></p><p style="text-align:left;"><span style="font-size:12pt;font-weight:400;">WiFi Protected Access (WPA) 3 is the latest evolution of security for 802.11 wireless LANs (the normal wireless standard we use daily). It's the first major security enhancement in over a decade, which is stunningly embarrassing in an industry where vulnerabilities and new attacks emerge daily. With the updates, we'll see enhanced cryptography protocols (including the addition of elliptic curve), much better downgrade attack protection, support for unauthenticated encryption (meaning encrypting guest portals and such), as well as an upgrade to the operation of what's currently known as pre-shared key (PSK), via a new protocol called simultaneous authentication of equals (SAE). </span></p><p style="text-align:left;"><span style="font-size:12pt;font-weight:400;">Take-aways: </span></p><ul><li><p style="text-align:left;"><span style="font-size:12pt;font-weight:400;">There's a lot to know when planning a WPA3-enabled network so we'll dive in to this more at a later date. For now, know that this is out, it's available, it's supported in your enterprise WiFi infrastructure, and your organization should be ensuring new endpoints (especially headless/IoT devices) support this. </span></p></li><li><span style="font-size:12pt;font-weight:400;">For the network and WiFi architects, we'll be providing additional guidance on how to properly architect with these new features for the greatest security benefit and to meet compliance requirements. <br></span></li></ul><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;font-weight:700;">2. WiFi 6E</span></p><p style="text-align:left;"><span style="font-size:12pt;">Usually referred to as WiFi 6 &quot;extended&quot; or &quot;enhanced&quot; (not a real name, just a pet name we gave it), WiFi 6E is WiFi 6th generation (802.11ax technology) over the newly-opened 6GHz spectrum. We can barely keep up with all the WiFi terms, so I'm not going to assume any knowledge here. To put it in perspective, for decades, we've been using WiFi over 2.4GHz and 5GHz spectrum. The road to opening additional spectrum (in this case 6GHz) for unlicensed use has been a multi-year escapade for the WiFi industry and the FCC. Radio frequency changes in our WiFi infrastructure and endpoints are hardware (not software) changes. The benefit will be more security (through force), support for higher density of devices, and ultimately the ability to increase throughput. <br></span></p><p style="text-align:left;"><span>&nbsp;</span></p><p style="text-align:left;"><span style="font-size:12pt;">Take-aways: </span></p><ul><li><p style="text-align:left;"><span style="font-size:12pt;">Even though WiFi 6E is an 'extension' of WiFi 6, there will be </span><span style="font-size:12pt;font-style:italic;">mandatory</span><span style="font-size:12pt;"> security features and removal of support for many deprecated features commonly used today in WiFi 6 (802.11ax) networks. </span></p></li><li><p style="text-align:left;"><span style="font-size:12pt;">Because it's a hardware upgrade, organizations interested in this technology should be sure to procure WiFi infrastructure and endpoints with radios that support 6GHz. If you're not sure if WiFi 6E is something you should be looking at, drop us a note and we can help.<br></span></p></li><li><p style="text-align:left;"><span style="font-size:12pt;">Our tools for monitoring and securing WiFi over the air will also need an upgrade, so set aside budget for re-tooling and training for your teams.&nbsp; </span></p></li><li><p style="text-align:left;"><span style="font-size:12pt;">And to further complicate things, use of the new spectrum and additional radios will also mean organizations should be investing in edge switching products that support the latest power over Ethernet standards (these puppies will need the juice) as well as multi-gig Ethernet ports (the higher data throughput supported will oversubscribe 1Gbps edge ports). </span></p></li></ul><p style="text-align:left;text-indent:0in;"><span>&nbsp;</span></p><p style="text-align:left;text-indent:0in;"><span style="font-size:12pt;font-weight:700;">3. CBRS and Private LTE/Private 5G</span></p><p style="text-align:left;text-indent:0in;"><span style="font-size:12pt;">This is a pretty cool one, because of the myriad use cases that can help organizations of all sizes and industries. Private LTE/5G is simply the use of cellular RF technology for private use. So, it would be like having a cellular network that's used and managed just like your regular WiFi - except with added security. Your data doesn't traverse a carrier (unless that's your chosen egress) and you own and manage the hardware, typically through a coordinated cloud platform. </span></p><p style="text-align:left;text-indent:0in;"><span>&nbsp;</span></p><p style="text-align:left;text-indent:0in;"><span style="font-size:12pt;">CBRS is probably exactly what you think it is - Citizen Broadband Radio Service. It's just that in the Private LTE world here in the U.S. that's the radio spectrum we chose to use. We refer to it as band 48, and it's in the 3+GHz range between our traditional WiFi of 2.4 and 5GHz. Private LTE technology gives users a WiFi-like user experience with the benefits of cellular-- specifically enhanced security through SIM/eSIM, coverage over much longer distances, support for higher density, and a much greater resiliency of signal (virtually no interference as we have with WiFi). </span></p><p style="text-align:left;text-indent:0in;"><span>&nbsp;</span></p><p style="text-align:left;text-indent:0in;"><span style="font-size:12pt;">Take-aways:</span></p><ul><li><p style="text-align:left;"><span style="font-size:12pt;">CBRS/Private LTE/5G should be on every CIO's/CISO's radar because of the volume of use cases and problems it can solve in today's digital transformation projects and the enhanced security it can provide for IoT.</span></p></li><li><p style="text-align:left;"><span style="font-size:12pt;">This technology has several real-world case studies from connectivity for critical devices in hospitals, to sensitive OT devices, public venues, municipal wireless in rural communities (by towns and schools), and the list goes on. </span></p></li><li><p style="text-align:left;"><span style="font-size:12pt;">A <span style="font-style:italic;">lot </span>of devices come with Private LTE support. In addition to mobile phones and tablets, many handheld scanners, OT and IoT devices and sensors and even laptops support Private LTE. And that list is growing. </span></p></li></ul><p style="text-align:left;text-indent:0in;"><span>&nbsp;</span></p></span><div><span style="color:inherit;"><span style="font-size:12pt;">Those were the 3 key wireless security trends I wanted to hit on today. We'll keep diving more in to these, and I'll share more content from this and other presentations and workshops as we go. <br></span></span></div>
<div><span style="color:inherit;"><span style="font-size:12pt;"><br></span></span></div>
<div style="text-align:center;"><span style="color:inherit;"><span style="font-size:12pt;"><img src="/blog-ciso-network-cheatsheet-wireless-security.jpg"></span></span></div>
</div></div><div data-element-id="elm_nK8CNWTITPeRYLfQqGkloA" data-element-type="button" class="zpelement zpelem-button "><style> [data-element-id="elm_nK8CNWTITPeRYLfQqGkloA"].zpelem-button{ border-radius:1px; } </style><div class="zpbutton-container zpbutton-align-center "><style type="text/css"></style><a class="zpbutton-wrapper zpbutton zpbutton-type-primary zpbutton-size-md zpbutton-style-none " href="https://zc.vg/K5Fzk" target="_blank"><span class="zpbutton-content">Get more insights</span></a></div>
</div></div></div></div></div></div> ]]></content:encoded><pubDate>Wed, 23 Jun 2021 20:05:00 -0400</pubDate></item></channel></rss>