Expert: Wireless security is all about location

Wireless security can benefit from old real estate mantra ' location, location, location, a wireless security expert said yesterday.

Authenticating wireless users by the location of the access points they use is a good benchmark for role-based access to networks, said Matthew Gray, founder and chief technology officer at Newbury Networks.

Location-based authentication prevents social engineering and back-door attacks and discourages attempts to enter networks by brute force, Newbury said Feb. 27 at the FCW Events Wireless/RFID Conference 2006.

'If they're on the fence line, don't let them in,' Gray said.

A division of the U.S. Air Force that works with Newbury Networks has made location-based authentication mandatory at its facilities since finding that using it blocked nearly all incoming attacks, Gray said.

Featured

  • business meeting (Monkey Business Images/Shutterstock.com)

    Civic tech volunteers help states with legacy systems

    As COVID-19 exposed vulnerabilities in state and local government IT systems, the newly formed U.S. Digital Response stepped in to help. Its successes offer insight into existing barriers and the future of the civic tech movement.

  • data analytics (Shutterstock.com)

    More visible data helps drive DOD decision-making

    CDOs in the Defense Department are opening up their data to take advantage of artificial intelligence and machine learning tools that help surface insights and improve decision-making.

Stay Connected