Securing the WLAN

Martin Courtney
clock

Martin Courtney asks how IT departments handle security and user access management on wireless networks

Mobile computing has truly come of age in the past couple of years. This is due in part to portable wireless devices combining internet access, email and mobile business applications with voice-calling...

To continue reading this article...

Join Computing

  • Unlimited access to real-time news, analysis and opinion from the technology industry
  • Receive important and breaking news in our daily newsletter
  • Be the first to hear about our events and awards programmes
  • Join live member only interviews with IT leaders at the ‘IT Lounge’; your chance to ask your burning tech questions and have them answered
  • Access to the Computing Delta hub providing market intelligence and research
  • Receive our members-only newsletter with exclusive opinion pieces from senior IT Leaders

Join now

 

Already a Computing member?

Login

More on Mobile Phones

Tech gift ideas 2021

Top 12 Christmas gift ideas for 2021

Wondering what to get for the tech enthusiast in your life? More importantly, wondering what to get for yourself? Then read on for Computing's guide to the must-have gifts for 2021...

Otto Sumner
clock 03 December 2021 • 4 min read
Russia, China, Iran and international terrorism are the 'big four' threats facing the Western world

MI6 chief seeks help from tech firms to counter hostile state threats

Unlike James Bond's Q, the spy agency cannot develop all the technologies it needs in-house

clock 01 December 2021 • 3 min read
Seeking women in cyber security? Cast your net smaller!

Seeking women in cyber security? Cast your net smaller!

Jenny Duffy – penetration tester and head of talent at Pentest People – describes the obstacles she overcame to get into cyber security and what drives her mad about employers saying they can’t find good cyber security people.

Jenny Duffy
clock 29 November 2021 • 5 min read