WPA and WPA2 Vulnerabilitie

On October 16, 2017, a statement from the International Consortium for Advancement of Cybersecurity on the Internet (ICASI) was released alerting the industry to a series of vulnerabilities for WPA and WPA2. These vulnerabilities affect a large number of wireless infrastructure devices and wireless clients, across many vendors. This security flaw means
that, for vulnerable clients and access points, WPA and WPA2-encrypted Wi-Fi traffic is no longer secure until certain steps are taken to remediate the issue. The Wi-Fi data stream,including passwords and personal data, can be intercepted, decrypted, and modified without a user’s knowledge. 

Continue reading “WPA and WPA2 Vulnerabilitie”


After receiving so many requests to explain the difference between a UTM (Unified Threat Management) and NGFW (Next Generation Firewall), I came across a great video that explains it in detail and decided we should shed some light on it and help customers and partner to better understand the difference.

Continue reading “UTM vs NGFW”