Guest WiFi Setup with VLAN

RICK'S PERFORMANCE COMPUTING | January 22, 2016

article image
A brief overview of how I setup a guest WiFi login on my home network. This includes port level #VLAN settings.

Spotlight

ThreatQuotient

ThreatQuotient™ understands that the foundation of intelligence-driven security is people. The company’s open and extensible threat intelligence platform, ThreatQ™, and cybersecurity situation room solution, ThreatQ Investigations, empower security teams with the context, customization and prioritization needed to make better decisions, accelerate detection and response, and advance team collaboration. Leading global companies use ThreatQuotient solutions as the cornerstone of their security operations and threat management system. ThreatQuotient is headquartered in Northern Virginia with international operations based out of Europe and APAC. For more information, visit https://threatquotient.com.

OTHER ARTICLES

Lanner Launches Open, Scalable, and Programmable Edge Solution for Enterprise 5G

Article | March 3, 2020

In a recent release, Lanner Electronics, a global leading manufacturer of advanced network appliances announced the release of a new Multi-access Edge Compute (MEC) platform. Developed in collaboration with Barefoot Networks, an Intel company, NoviFlow, and Fortinet, the platform reportedly integrates Intel Xeon Scalable processor-based compute nodes, Barefoot Tofino P4-programmable Ethernet switch silicon, Fortinet's Fortigate VNF, and NoviFlow's CyberMapper programmable networking software. By deploying network-based capabilities in edge infrastructure to secure applications and data, the next-gen MEC solution will be able to simplify network architecture, accelerate application deployment, eliminate cabling complexity, and enable zero-touch provisioning of network edge infrastructure, the companies said.

Read More

How will 5G transform transport?

Article | February 26, 2020

If 2019 was the year that 5G’s impact on transportation spluttered into life, then 2020 will see it move through the gears and start to transform the way we travel.While the arrival of the much-vaunted, fully autonomous vehicle is still some way away, most of the world’s major car brands are set to release new 5G-enabled models which link into the internet of things (IoT) and offer drivers and their passengers a wealth of new opportunities. According to analysts Gartner, the share of cars actively connected to a 5G service will grow from a current base of 15 per cent to 74 per cent by 2023 and 94 per cent five years later.

Read More

Poor Power Supply, Inadequate Fibre Cables May Hinder 5G Network – NCC

Article | March 2, 2020

The Nigerian Communications Commission (NCC), has said that the current level of power situation in the country as well as the inadequate fibre cables may impact negatively on the commercialisation of the fifth generation network, 5G These are the key challenges identified by experts from the commission at the Social Media Week, Lagos (SMWL) on Thursday, during the NCC session themed: Fifth Network Deployment: Social Economic Benefits and Challenges. The experts from the commission agreed that the power infrastructure gaps that currently exist in the country does not encourage that level of technology and prays things improve before telecom operators in Nigeria are ready for massive rollout of the business.

Read More

What are the implications of LinkedIn’s latest data breach?

Article | June 30, 2021

Although the cause is as yet unknown, this breach is likely to have the same culprit as most large scale data breaches that have occurred in recent memory, through a simple misconfiguration of a server or shared repository. As the sheer size, scale, and footprint of global technology vendors like Microsoft, Facebook, Google, and so on continues to grow, so too does the opportunity for simple errors to make their way into some infrastructure configurations that can then be exploited.

Read More

Spotlight

ThreatQuotient

ThreatQuotient™ understands that the foundation of intelligence-driven security is people. The company’s open and extensible threat intelligence platform, ThreatQ™, and cybersecurity situation room solution, ThreatQ Investigations, empower security teams with the context, customization and prioritization needed to make better decisions, accelerate detection and response, and advance team collaboration. Leading global companies use ThreatQuotient solutions as the cornerstone of their security operations and threat management system. ThreatQuotient is headquartered in Northern Virginia with international operations based out of Europe and APAC. For more information, visit https://threatquotient.com.

Events