Wireless Security – Super Tuesday Poll

Related Posts:

The Importance of Tagging

While at INTEROP last week, I met several journalists, analysts, etc. Several of them visited WiFiJedi.com and gave me feedback.  

One piece of constructive criticism was that while the content was good, there was no real good way to find past material.  This individual suggested that I have a tag cloud widget on my blog cross-referencing posts on a given topic.  

Therefore, I have taken this suggestion and placed a tag cloud on the side bar of my blog. I have always had the drop down category box and the search field that appear below the tag cloud.  At the bottom of every post, I have also tried to link to other applicable WiFiJedi.com material.  Have you used these features? Do you like the tag cloud? Please let me know what you think in the comments section.

At any rate, the tag cloud coversation reminded me of one of the sessions I attended at INTEROP titled “Next Generation Search: Social Bookmarking and Tagging” by Thomas Vander Wal.  Here is an oversimplified graphic from the presentation:

Interest –> Culture 

Vocabulary –> Terminology 

Mr. Vander Wal suggested that bookmarking and tagging turn individual interest into a shared culture and how they also turn an individual vocabulary into shared terminology.  

Coincidently enough, that same day I found a Twitter service called Twittersheep that generates a tag cloud of all the terms used in the biographies of your followers.  Here is what it generated from my followers:

What really jumped out at me was how much of a reflection of my background and interests are mirrored by my Twitter followers.  I guess we are attracted to people who persue similar activities.  Go ahead and try it and let me know if you come to a similar conclusion! 

Related Posts: 

Twitter Power – Book Review

This should be considered the “how-to Twitter bible” for beginners and experts alike. For beginners, the book talks about how to use the technology for many different purposes including advertising, selling, customer service, etc.

For advanced users, the book discusses third-party tools, Twitter application development, and legal concerns.

Personally, the section I enjoyed the most was how to use Twitter to build and maintain a personal brand.

Joel writes in a very friendly, informal way which puts the reader at ease and enables them to digest the material at a rapid pace. Don’t let that fool you though – there are plenty of examples, case studies, and hyperlinks throughout the book.

The book ends with a 30 day action plan for how to get maximum value from using Twitter. It has specific steps to accomplish each day.

Purchasing the book also includes a free “ticket” to Joel’s online 4-week social media workshop. I found out about this feature watching Joel’s video preview of the book on Amazon. It was one of the deciding factors to purchase this versus another Twitter title. However, when the book arrived, I got so caught up in reading it, I haven’t registered for the online workshop yet. I guess that is the ultimate testimonial for how engrossing the book is…

Related Posts:

Melee at the Mandalay – Live Men’s and Women’s Boxing!

If you have been paying attention to my blog, you know that I am in Las Vegas this week for both INTEROP and the Forrester IT Forum. My employer, Xirrus, is exhibiting on the INTEROP show floor.  The booth theme this year is “Melee at the Mandalay”, which takes the audience through a several round bout between the Wi-Fi Array vs. the Traditional Wired Workgroup Switch.  This actually piggybacks off the Xirrus theme last year, which was “Ditch the Switch”.

In conjunction with the Melee at the Mandalay theme, Xirrus is holding live boxing! I saw several fights today and they were pretty exciting!  Although each fight has a new set of boxers, they seemed to be getting more aggressive throughout the day.  I can’t wait to watch tomorrow’s (Wednesday, May 20th) matches, which are scheduled for 11AM, 1PM, 2:30PM, and 4PM.   There will also be several matches held on Thursday. Here are a couple photos that I took standing along ringside:

You can also see video footage of some of the earlier matches at the Xirrus website – http://www.xirrus.com

Related Posts:

INTEROP Preview

I made it to Syn-City.  Whoops!  That’s the geek in me.  You know… the three way handshake… Syn, Syn-Ack, Ack  (I guess its not a good joke if you have to explain it).   

This week, I will be attending both INTEROP and Forrester’s IT Forum.  Due to the lack of sleep this city usually affords me, I will be concentrating my efforts on my Computerworld blog, and plan to have a post everyday, starting this evening and running through Thursday.  

It’s going to be a busy week for me.  Besides blogging, my employer (Xirrus) is exhibiting at the show as well as providing the WiFi for all exhibitors and attendees.  (Translation: I will be pulling booth duty.  Stop on by and say hello!)

I also have a number of meetings set up with some real movers and shakers in the wireless industry.  Today, I had lunch with Craig Mathias, who is the conference chair of the wireless track at INTEROP.  Craig and I had a great discussion.  We discussed

  • What looks to be the most exciting part of the upcoming wireless track at INTEROP 
  • If wireless is a capable replacement to Ethernet switching to the desktop 
  • The general decline in interest in wireless security

I plan on transcribing our Q&A in my Computerworld blog post later this evening.  Over the next few days, I will have Q&A with other journalists, analysts, etc. so reach out and let me know in the comments section what I should ask them!

I also have several other “extra-curricular activities” while I am in Vegas.  No, it’s not what you’re thinking…  One such event that I am particularly excited about it tonight’s “Beer & Bloggers” event down at Palazzo.  If you are in Vegas, come on by!  The logistical information is below:

Las Vegas Tweetup – 2009
Monday May 18, 2009 from 6:00pm – 8:30pm
Dos Caminos
inside the Palazzo Hotel/Casino
3325 Las Vegas Blvd.
South Las Vegas, Nevada 89109

http://lasvegas.beerandblog.com/2009/05/02/forresters-las-vegas-tweetup-2009/

What Every IT Professional Should Know About 802.11n

CWdot11nPostAre you one of the thousands of people who already read, “What every IT professional needs to know about 802.11n”?  If so, thanks for reading!   

Please feel free to comment, either here at WiFiJedi.com or on the actual Computerworld post.   

I also recently found out that someone submitted the story to Reddit.com (thank you to “Geek” for picking up the story).  

I have to admit that I am still learning about the social bookmarking sites such as Digg, Reddit, and Delicious.  However, I always appreciate the additional exposure, so please consider adding any of my stories that you think are worthy.  I also love the comments that come back from getting listed on a social bookmark system.  They help me focus on what’s most helpful for you, the reader.  

Stay tuned to my Computerworld blog (http://blogs.computerworld.com) for Part 2 of this series, in which I will discuss some of the main deployment considerations for 802.11n WLANs.  NOTE: I am attending INTEROP this week, so it probably won’t appear until sometime next week. 

Super Tuesday – Wireless IDS/IPS Question#2

Related Posts:

Importance of WIDS/WIPS (Wi-Fi Masterminds)

This is the first in a series of posts that I am dubbing “Wi-Fi Masterminds” (TM). I will ask questions to a series of panelists and they will answer in round-robin fashion, where they can answer the question as well as respond to others.

If you have ever seen the show “Around the Horn” on ESPN, that is the type of interaction I am looking for.

I am planning on a pool of 6-8 masterminds, bit will limit each question to a panel of three members. I will try to minimize my own involvement in the questions to only provide structure where needed or correct any factual errors.

Without further delay, let’s meet today’s panelists, shall we?  They are… 

jennifer Jennifer Huber CCNP, RFID+, CWNE #51  @jenniferlucille  — Jennifer has over 8 years of  experience in the networking and wireless engineering industry. She has a solid background in  supporting, designing, deploying, and troubleshooting 802.11a/b/g/n Enterprise wireless    installations, as well as the ability to take complex information and explain problems and solutions in  terms that are easily understood. 

keith Keith R. Parsons, CWNE #3:  – @keithparsons   http://WLANiconoclast.blogspot.com — A gifted  presenter, Keith is known for his wit and broad technical expertise. He holds over 50 technical  certifications and has earned an MBA from the Marriott School of Management. He is author (or editor) of a  dozen technical publications and has developed seven technical certification programs. He travels  throughout North America, Europe, Africa, Asia and Australia in behalf of a wide variety of IT vendors,  explaining networking technology to industry professionals.

joel Joel Barrett, CWNP#6: @joelbarrett  —  Joel Barrett is a senior-level wireless networking architect  with Cisco Systems. Joel consults primarily with large enterprise customers concerning complex  wireless deployments. He is an author of wireless industry books and lexicographer for “The Official  CWNP Dictionary of Wireless Terms and Acronyms”.

 

I asked the panelist the following questions:

How important do you think wireless IDS/IPS functionality is in an enterprise WLAN?  What do you think are important features of wireless IDS/IPS systems? 

Here is what they had to say… 

Jennifer:  The need for robust IDS/IPS alerting is essential in enterprise WLANs used in environments where the security of WLAN data is of import, or may be required by law.  Generating a baseline of WLAN usage, and implementing periodic auditing could mitigate the impact of a data breach, or prevent a repeat of the 2007 T. J. Maxx data theft incident.  Implementing a WIPS/WIDS system is usually one of many steps toward HIPAA or PCI compliance.  The ability of the WIPS/WIDS system to determine if a rogue AP is connected to the enterprise network is especially beneficial when determining the real threat of the rogue device.

Keith:  I agree with Jennifer’s initial description of the value of a wireless IDS/IPS system. I too have noticed the initial value of a WIDS is in the area of security. Being able to configure the correct security alarms for the intrusions your company cares about is paramount. A WIDS straight out of the box will give hundreds, if not thousands of alarms. The first step should be to correctly choose and configure the alarms your firm cares about tracking. Then build the proper response to those alarm triggers, i.e. document the remediation process for each alarm. As you clear each alarm category, then slowly add more alarms to the WIDS system until you get to where your firm wants to be. 

In my clients, they purchase a WIDS for security – but then received the best ROI based on the performance alarms and learning to better adapt the performance characteristics of their Wireless LAN – thus getting double, triple or higher throughput increases. Yes, the security is important, but a great WIDS/WIPS should also help you to troubleshoot and ‘tweak’ your Wireless LAN as well.

Joel: Wireless IDS/IPS is important because, for any establishment that accepts credit cards, PCI DSS compliance requires it. Customers who don’t accept credit cards should still implement WIDS/WIPS so they are aware of security threats and can take steps to reduce or eliminate rogue devices. In my opinion, it is more important to do continual monitoring rather than just periodic monitoring, as required by PCI DSS.

The most important feature, after detecting rogues, is the ability to produce meaningful reports so that management can understand what needs to be done to properly, quickly, and legally deal with those rogue devices.

What do YOU think?  Let our panel know by submitting a comment! 

Related Posts: 

Wi-Fi Masterminds

I am starting a new series here called “Wi-Fi Masterminds” (TM).

I will ask questions to a series of panelists and they will answer in round-robin fashion, where they can answer the question as well as respond to others.

If you have ever seen the show “Around the Horn” on ESPN, that is the type of interaction I am looking for.

I am planning on a pool of 6-8 masterminds, bit will limit each question to a panel of three members. I will try to minimize my own involvement in the questions to only provide structure where needed or correct any factual errors.

I am drawing the masterminds from several different wireless vendors & VARs as all as individual consultancies. I would like to keep the discussion as vendor neutral as possible. I understand that it may be necessary to refer to vendor specifics from time to time, but have asked all panelists to be respectful of other vendor viewpoints.

My first question is about wireless IDS/IPS systems and is meant to piggyback off of recent content I published here as well as on my Computerworld blog.

Feel free to suggest future topics and/or volunteer as a panelist. When the first post is published (hopefully in the next day or two), let our panel know what you think by submitting a comment of your own.

My Customized Twitter Background

 

As many of you know, I have started an account on Twitter under the user name “wifijedi”.

No, I wasn’t influenced to join by Oprah, or the Ashton Kutcher vs. CNN competition.

I see it mostly as a micro-blogging tool and enjoy sending out shorter, yet more frequent updates.

Recently, my Twitter profile page got a makeover. Thanks to friend and co-worker John Merrill, I now have a customized background.

My background serves as a central repository for WiFi Jedi branded content including my blog, my Computerworld blog, my LinkedIn profile, and my lens on Squidoo.

You can check out my new background at http://www.twitter.com/wifijedi