Remove listing tags channel-trends
article thumbnail

Black Hat USA 2022: Creating Hacker Summer Camp

Cisco Security

In part one of this issue of our Black Hat USA NOC (Network Operations Center) blog, you will find: Adapt and Overcome. I hope you will read on, to learn more lessons learned about the network and the part two blog about Cisco Secure in the NOC. Building the Hacker Summer Camp network, by Evan Basta. But why did it need a team of ten?

article thumbnail

Black Hat Asia 2022: Building the Network

Cisco Security

In part one of this issue of our Black Hat Asia NOC blog, you will find: . On the wireless front, we made extensive use of our Radio Profiles to reduce interference by tuning power and channel settings. Using the Sentry allowed us to easily identify devices in the client list. Meraki Scanning API Receiver by Christian Clasen

article thumbnail

Black Hat USA 2023 NOC: Network Assurance

Cisco Security

As the device now had TWO Wi-Fi profiles, it was now free to use its inbuilt prioritisation list (more details here ) ensuring that the device joined the more secure of the networks (802.1x The same script was then copied and amended to add tags to devices. So, to make this flexible, we use tags in Meraki Systems Manager speak.