IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Wireless Security

RSS Feed   
ALSO CALLED: mSecurity, Wireless LAN Security, Wi-Fi Security, Wireless Network Security, WLAN Security, Mobile Security
DEFINITION: Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection. Bluetooth is a high-speed but very short-range wireless technology for exchanging data between desktop and mobile computers, personal digital assistants (PDAs), and other devices. By exploiting a vulnerability in the way Bluetooth is implemented on a mobile phone, an attacker can access information -- such  … 

Wireless Security definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary
Wireless Security White Papers (View All Report Types)
1 - 25 of 91 Matches Previous Page  |  Next Page
Enterprise Wi-Fi 6 Goes Mainstream
sponsored by CommScope
WHITE PAPER: As performance remains a top concern for Wi-Fi users, enterprises are adopting the latest version: Wi-Fi 6. By reading this white paper, you can explore the scale of Wi-Fi 6 adoption, its prospective effect on business productivity and how it could pave the way for technologies such as IoT.
Posted: 17 Nov 2020 | Published: 25 Jun 2020

CommScope

Covid-19 & the New Normal for E-commerce
sponsored by Tala Security
WHITE PAPER: While online shopping has increased dramatically since the beginning of the pandemic, so too have threats targeting shoppers and other users. In fact, Magecart attacks have increased by 20%. Read on to explore how COVID-19 is shifting the e-commerce landscape and discover the long-term implications of these changes.
Posted: 20 Aug 2020 | Published: 20 Aug 2020

Tala Security

Secure, Cloud-Controlled Network to Enable Work From Home
sponsored by CradlePoint
WHITE PAPER: When organizations plan for employees to work remote, they must consider both security and bandwidth, and uncover ways for these two to be compromised or effortlessly seamed together. Which route does your department choose to go? Do you have plans for edge computing? Browse this solution brief to learn more about modernizing your network.
Posted: 10 Aug 2020 | Published: 10 Aug 2020

CradlePoint

Cyberattacks on Mobile Devices are on the Rise
sponsored by Verizon
WHITE PAPER: 5G networks promise increased security, but as it stands now, many organizations need to implement their own mobile security measures. Greater functionality means greater vulnerability, and your network must be ready. This article describes the new threat landscape that arrives with 5G and tells you how your organization can prepare.
Posted: 13 Jul 2020 | Published: 13 Jul 2020

Verizon

Spear Phishing: Top Threats and Trends
sponsored by Barracuda
WHITE PAPER: Business email compromise (BEC) is an emerging cybersecurity threat that targets user inboxes. While BEC makes up just 7% of spear-phishing attacks, it’s responsible for over $26 billion in losses in the last four years. In this report, explore the latest BEC tactics used by scammers and best practices for protecting your organization.
Posted: 18 May 2020 | Published: 30 Nov 2019

Barracuda

The Malicious Bot Playbook: Early Warning Signs, and What to Do About Them
sponsored by Cloudflare
WHITE PAPER: Similar to social engineering attacks, bot attacks are highly targeted to expose the vulnerabilities of a specific organization. Understanding the telltale bot warning signs has proven to be an effective measure at predicting and preventing attacks. This playbook outlines the common warning signs and tactics for addressing them.
Posted: 01 May 2020 | Published: 01 May 2020

Cloudflare

Replace AV Buyer’s Guide
sponsored by VMware International Unlimited Company
WHITE PAPER: When it comes to protecting your endpoints against cyberattacks, choosing the right solution that is easy to deploy, easy to manage and can cost-effectively protect your growing business is critical. This buyer’s guide is designed to ease the process by providing you with the knowledge you need to make your selection.
Posted: 30 Apr 2020 | Published: 30 Apr 2020

VMware International Unlimited Company

Your Path to a Mature AppSec Program
sponsored by Veracode, Inc.
WHITE PAPER: Although applications are critical to how businesses operate, web apps are among the top risk areas that hackers attempt to expose. In fact, nearly 40% of global data breaches originate at the application-layer. In this guide, discover what effective application security looks like and learn the steps you can take to reach app sec maturity.
Posted: 01 Apr 2020 | Published: 01 Apr 2020

Veracode, Inc.

Intelligent Cloud Identity Platform
sponsored by SailPoint Technologies
WHITE PAPER: Digital transformation enables organizations to improve their agility and growth, allowing for increased productivity. However, this change also bring increasingly distributed workforces, which exposes an organization to potential risk. So, what can IT security leaders do to meet this risk? Download this white paper to find out.
Posted: 17 Mar 2020 | Published: 17 Mar 2020

SailPoint Technologies

The Four Biggest Challenges to Keeping Modern Applications Secure
sponsored by Radware
WHITE PAPER: According to a recent study, just 33% of organizations feel their web application firewall (WAF) addresses all application-targeted threats. While implementing a WAF is an important starting point for ensuring the protection of modern apps, there are other key challenges and threats to consider. Download this report to learn more.
Posted: 24 Feb 2020 | Published: 24 Feb 2020

Radware

SIG - Security Readout: 2019 Trends for Remote and Roaming User Security
sponsored by Cisco Umbrella
WHITE PAPER: In this research readout, take a closer look at the top trends in remote and roaming user security throughout 2019 and explore the challenges of distributed environment security and the solutions best positioned to these challenges.
Posted: 05 Feb 2020 | Published: 05 Feb 2020

Cisco Umbrella

Respond to the Changing Mobility Landscape
sponsored by Smarsh
WHITE PAPER: As employees rapidly adopt mobile devices for work communications, a challenge was created for organizations needing to capture and review all business communications for regulatory or public records response purposes. In this white paper, learn how organizations can build a strong, compliant mobility ecosystem.
Posted: 26 Nov 2019 | Published: 26 Nov 2019

Smarsh

5 Ways to Reduce Risk and Boost Productivity
sponsored by Citrix
WHITE PAPER: While IT must enable both the flexibility employees need to be productive and the security the business requires, this balancing act often ends in compromise. In this white paper, explore 5 ways a secure digital workspace can reduce risk and boost productivity.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Citrix

Employee Habits that Can Put Your Company at Risk
sponsored by Panda Security
WHITE PAPER: While maintaining secure devices and networks is critical to an organization's cybersecurity, it's not the only thing companies should focus on. When it comes to keeping an organization secure, employees are often the weakest link. Download this white paper to learn how employees are threatening your company and ways to prevent it.
Posted: 28 Jan 2019 | Published: 28 Jan 2019

Panda Security

Cryptojacking: A Hidden Cost
sponsored by Panda Security
WHITE PAPER: Cryptojacking is one of the newest threats to cybersecurity in the last two years. Easy to carry out and difficult to detect, these attacks involve cybercriminals taking control of a third-party device's CPU to mine valuable cryptocurrencies. Download this white paper to learn more about the threat and how to protect your devices.
Posted: 28 Jan 2019 | Published: 28 Jan 2019

Panda Security

Why Corporate Data Security Requires a Major Policy Shift in the Age of BYOD
sponsored by SearchSecurity.com
WHITE PAPER: Transitioning from Mobile Device Management (MDM) to Enterprise Mobile Management (EMM) can be daunting. Explore the key differences between EMM and MDM, how EMM features support security objectives, strategies to align EMM and MIS departments, and more.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

SearchSecurity.com

Network Protection and UTM Buyer's Guide
sponsored by Sophos
WHITE PAPER: This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

Sophos

BYOD File Sharing – Go Private Cloud to Mitigate Data Risks
sponsored by Accellion, Inc.
WHITE PAPER: Read this whitepaper to learn about a solution that can help you stay safe while going mobile, working with cloud file sharing, and more.
Posted: 13 Feb 2014 | Published: 28 Jun 2013

Accellion, Inc.

Why Switch to Thawte?
sponsored by Thawte Inc.
WHITE PAPER: This brief resource provides three key reasons why you should switch to a leading online security provider trusted by millions around the world.
Posted: 30 Sep 2013 | Published: 30 Sep 2013

Thawte Inc.

Antivirus Evaluation Guide
sponsored by Threat Track Security
WHITE PAPER: In this white paper, you will learn how to choose the antivirus solution that can effectively keep your network free of malware. In three simple steps you can implement an easy-to-deploy and easy-to-replicate testing curriculum that enables you to most accurately assess your company's solution's capabilities.
Posted: 13 Sep 2013 | Published: 31 Dec 2012

Threat Track Security

Protecting Your Website With Always On SSL
sponsored by Symantec Corporation
WHITE PAPER: This white paper discusses the imperative need for always on SSL, and the steps you can take to deliver end-to-end protection for your users. It also includes detailed accounts of four organizations that are leading the way with always on SSL in a cooperative effort to make the internet more secure.
Posted: 11 Sep 2013 | Published: 01 May 2012

Symantec Corporation

Symantec Website Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This document is a reference to understanding the threat landscape and how you can protect your company and your infrastructure.
Posted: 09 Sep 2013 | Published: 09 Sep 2013

Symantec Corporation

Simplify Network Management with New Secure and Scable Wireless Solutions
sponsored by DellEMC and Intel®
WHITE PAPER: Realizing the value of bring-your-own-device (BYOD) is only possible with a secure and flexible wireless solution in place. This resource explores the challenges of BYOD and the need for wireless connectivity in a wide range of industries, and offers guidance to help you get started.
Posted: 05 Aug 2013 | Published: 31 Jul 2013

DellEMC and Intel®

Wireless Solutions for Tablets and Smartphones
sponsored by Xirrus
WHITE PAPER: As the popularity of mobility grows, so do the challenges for IT. This resource explores how you can transform mobility from an IT challenge into a business opportunity by designing and managing a better wireless network.
Posted: 02 Aug 2013 | Published: 31 Dec 2011

Xirrus

Application Control at the Wireless Edge
sponsored by Xirrus
WHITE PAPER: With the advent of BYOD, cloud computing, and wireless, IT is losing control of the corporate network. This resource introduces an application intelligent solution that gives you the visibility and control you need to meet the challenges of the BYOD world.
Posted: 31 Jul 2013 | Published: 31 Dec 2012

Xirrus
1 - 25 of 91 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info