How Wireless Intruders Can Bypass NAC Controls

0

Organizations using port-based network access control (NAC) devices to contain wireless intruders may be less secure than they assume. Unless an organization is using the most secure WPA2-EAP authentication, an attacker with an initial foothold on the enterprise wireless network can bypass the protections enabled by NAC appliances and pivot deeper into the enterprise.

Read full news article on Dark Reading