IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Wireless Security

RSS Feed   
ALSO CALLED: mSecurity, Wireless LAN Security, Wi-Fi Security, Wireless Network Security, WLAN Security, Mobile Security
DEFINITION: Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection. Bluetooth is a high-speed but very short-range wireless technology for exchanging data between desktop and mobile computers, personal digital assistants (PDAs), and other devices. By exploiting a vulnerability in the way Bluetooth is implemented on a mobile phone, an attacker can access information -- such  … 

Wireless Security definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary
Wireless Security White Papers (View All Report Types)
1 - 25 of 108 Matches Previous Page  |  Next Page
Your Path to a Mature AppSec Program
sponsored by Veracode, Inc.
WHITE PAPER: Although applications are critical to how businesses operate, web apps are among the top risk areas that hackers attempt to expose. In fact, nearly 40% of global data breaches originate at the application-layer. In this guide, discover what effective application security looks like and learn the steps you can take to reach app sec maturity.
Posted: 01 Apr 2020 | Published: 01 Apr 2020

Veracode, Inc.

Re-thinking Application Security
sponsored by Tala Security
WHITE PAPER: Although customer-facing applications enable a better user experience, they remain one of the most vulnerable areas of an organization. Traditional security fails to prevent attacks targeting apps – so, how can organizations ensure security? This white paper outlines how to re-think application security in order to address modern threats.
Posted: 01 Apr 2020 | Published: 01 Apr 2020

Tala Security

Prioritizing Client-Side Website Security: Doing Nothing Is the Most Expensive Choice
sponsored by Tala Security
WHITE PAPER: When it comes to budgeting for investments in website security, the high price tags associated with acquiring additional tools or personnel makes some business leaders hesitant. In this white paper, learn how to calculate ROI by looking at the cost of breaches and discover the price of inaction.
Posted: 01 Apr 2020 | Published: 01 Apr 2020

Tala Security

Intelligent Cloud Identity Platform
sponsored by SailPoint Technologies
WHITE PAPER: Digital transformation enables organizations to improve their agility and growth, allowing for increased productivity. However, this change also bring increasingly distributed workforces, which exposes an organization to potential risk. So, what can IT security leaders do to meet this risk? Download this white paper to find out.
Posted: 17 Mar 2020 | Published: 17 Mar 2020

SailPoint Technologies

The Third Annual Study on the State of Endpoint Security Risk
sponsored by Morphisec, Inc.
WHITE PAPER: In this year’s annual study into the state of endpoint security risks take a closer look at the perception endpoint security, current trends, tactics and statistics. One noteworthy finding from the study is that 68% of respondents reported one or more attacks in 2019 that resulted in a compromised endpoint. Read on to unlock the full report.
Posted: 17 Mar 2020 | Published: 31 Jan 2020

Morphisec, Inc.

5 Essential Elements of a Comprehensive Endpoint Security Strategy
sponsored by Cyber-Ark Software
WHITE PAPER: Digital transformation continues to be a top priority at organizations. However, business leaders should be aware that a critical part to the digital transformation journey is reconsidering how you monitor and protect endpoints. In this white paper, discover 5 key elements for an effective endpoint security strategy.
Posted: 16 Mar 2020 | Published: 16 Mar 2020

Cyber-Ark Software

The Spectrum of Mobile Risk: The Full Range of Risks to Enterprise Data
sponsored by Lookout Inc.
WHITE PAPER: Risk management tactics needs to evolve to address mobile devices and the risks that threaten them. To encourage this evolution, Lookout developed the Mobile Risk Matrix to help organizations better understand the various mobile device risk and how to address them. Read on to unlock the Matrix.
Posted: 28 Feb 2020 | Published: 28 Feb 2020

Lookout Inc.

The Top Automated Bot Threats to Applications and How to Stop Them
sponsored by Radware
WHITE PAPER: Today, malicious bots compromise of 26% of total internet traffic. Bots scour the internet, and bypass traditional security methods in order to attack online businesses. So, how can your organization be better equipped to handle this threat? Download this white paper to uncover the top threat tactics & how to mitigate them.
Posted: 25 Feb 2020 | Published: 25 Feb 2020

Radware

The Four Biggest Challenges to Keeping Modern Applications Secure
sponsored by Radware
WHITE PAPER: According to a recent study, just 33% of organizations feel their web application firewall (WAF) addresses all application-targeted threats. While implementing a WAF is an important starting point for ensuring the protection of modern apps, there are other key challenges and threats to consider. Download this report to learn more.
Posted: 24 Feb 2020 | Published: 24 Feb 2020

Radware

Securing the Human Perimeter with Natural Language Understanding
sponsored by Armorblox
WHITE PAPER: The traditional notion of what constitutes a perimeter is disappearing, user behavior is evolving, and organizations are incorporating mobile workforces and remote devices. Applying adequate security today requires a change in mindset to focus on the human perimeter. Download this white paper to learn more.
Posted: 21 Feb 2020 | Published: 31 May 2019

Armorblox

Best Practices for Enterprise Phishing Protection
sponsored by PhishLabs
WHITE PAPER: According to the SANS Institute, 95% of data breaches start with phishing attacks. As these attacks become increasingly frequent and difficult to detect, organization’s need to rethink how they reduce the risk of these attacks. Download this white paper to uncover 15 best practices to boost your phishing detection and security.
Posted: 20 Feb 2020 | Published: 20 Feb 2020

PhishLabs

How to Provide a Safe Learning Environment
sponsored by Absolute Software Corporation
WHITE PAPER: Technology has become a fundamental part of the education system, and it’s likely to continue as a classroom trend. However, these devices also present risks to students and schools. Download this white paper to uncover 3 approaches your organization should adopt in order to ensure a safer learning environment.
Posted: 18 Feb 2020 | Published: 18 Feb 2020

Absolute Software Corporation

The Email Incident Response Playbook
sponsored by PhishLabs
WHITE PAPER: Just as technology advances, so too do the tactics used in cyberattacks. Phishing tactics have grown in their complexity, and traditional detection methods are incapable of adequate security. Download this playbook to discover how to build an incident response program that can detect, isolate and respond to phishing attack.
Posted: 17 Feb 2020 | Published: 17 Feb 2020

PhishLabs

How to Handle Phishing Threats That Bypass Email Security Technology
sponsored by PhishLabs
WHITE PAPER: The scope of phishing attacks has evolved beyond email over recent years to malicious attempts within any digital medium. In this white paper, take a closer look at modern phishing tactics, where they’re likely to strike and best practices for mitigating these threats.
Posted: 17 Feb 2020 | Published: 17 Feb 2020

PhishLabs

The Root Of (Almost) All Security Issues
sponsored by Tala Security
WHITE PAPER: In order to establish adequate data protection, security teams need to ensure they address both technical (code and data) & non-technical (user behavior) risks. In this white paper, Sanjay Sawhney, VP of Engineering at Tala, highlights how these issues lead to significant disruptions and offers best practices for addressing them.
Posted: 17 Feb 2020 | Published: 17 Feb 2020

Tala Security

Prevent Browser-Injected Ads from Hijacking Your Customers
sponsored by Tala Security
WHITE PAPER: By eliminating browser-injected ads, you can enhance customer experience on your website, which can lead to increased conversions, reduced shopping cart abandonment, and more. But what is the best way to go about blocking unwanted ads? Download this white paper to learn more.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

Tala Security

SIG - More Organizations are Using a Secure Internet Gateway for Secure Access
sponsored by Cisco Umbrella
WHITE PAPER: What if you could provide workers with safe access to the internet — no matter what device they’re using or where they’re located, even if they aren’t on the VPN? A Secure Internet Gateway (SIG) provides just that. Download this trend report to unlock an in-depth analysis of SIG.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Cisco Umbrella

The Cost of a Data Breach in Healthcare
sponsored by Absolute Software Corporation
WHITE PAPER: Today’s healthcare organizations are facing constant threats from hackers attempting to steal PHI. Security teams are tasked with protecting patient data while facilitating an increasingly mobile workforce. In this white paper, take a closer look at the threats within the healthcare industry by reviewing some unfortunate breaches.
Posted: 10 Feb 2020 | Published: 08 Jan 2019

Absolute Software Corporation

Cybersecurity and Education: The State of the Digital District in 2020
sponsored by Absolute Software Corporation
WHITE PAPER: Technology in the classroom is on the rise, and securing these critical endpoints grows increasingly challenging for K-12 IT teams. In 2019 alone, 49 separate school districts were victims of ransomware attacks. Check out this research report to learn more about the security threats and tactics plaguing our school systems.
Posted: 07 Feb 2020 | Published: 07 Feb 2020

Absolute Software Corporation

Core - DNS - Employees Like to Use Unsanctioned Apps - and Don’t Plan to Stop
sponsored by Cisco Umbrella
WHITE PAPER: It’s an unfortunate truth that employees are going to download unsanctioned apps. While these apps may boost productivity, they also expose your network to risk. Don’t wait for threats to strike – download this white paper and discover a new approach to network security that means no more playing defense.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

Cisco Umbrella

SIG - Security Readout: 2019 Trends for Remote and Roaming User Security
sponsored by Cisco Umbrella
WHITE PAPER: In this research readout, take a closer look at the top trends in remote and roaming user security throughout 2019 and explore the challenges of distributed environment security and the solutions best positioned to these challenges.
Posted: 05 Feb 2020 | Published: 05 Feb 2020

Cisco Umbrella

Proofpoint Advanced Email Protection: Analyst Report
sponsored by Proofpoint
WHITE PAPER: As companies continue to rely on email as their primary communication channel, the need for email security becomes a critical priority. According to Forrester, as many as 94% of attacks start with email. In this report, take a closer look at the results of Forrester’s research into the benefits and costs of email security programs.
Posted: 03 Feb 2020 | Published: 31 Oct 2019

Proofpoint

Magecart Attack on Focus Camera
sponsored by Tala Security
WHITE PAPER: Magecart attacks continue to plague websites and sensitive customer data. In this solution brief, learn how Tala Security protects against client-side attacks by exploring the features and capabilities the enable them to provide website security.
Posted: 24 Jan 2020 | Published: 24 Jan 2020

Tala Security

Lattes, Lunch, and VPNs: Securing Remote Workers the Right Way
sponsored by Malwarebytes
WHITE PAPER: This short story follows the journey of two remote workers as they face the cybersecurity threats associated with remote access, VPNs and cloud platforms. Read on to learn how they overcome these challenges and reshape their security strategy.
Posted: 23 Jan 2020 | Published: 23 Jan 2020

Malwarebytes

Cybercrime Tactics and Techniques: Ransomware Retrospective
sponsored by Malwarebytes
WHITE PAPER: In this edition of Cybercrime Tactics and Techniques, take an in-depth look into ransomware attacks over the past few years – attack methods, common targets and notable subcategories. In addition, this report will consider where ransomware will go next, and how to prepare. Read on to reveal the full report.
Posted: 21 Jan 2020 | Published: 31 Aug 2019

Malwarebytes
1 - 25 of 108 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info