IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Wireless LAN Security

RSS Feed   
Wireless LAN Security Reports
 
Top 5 Use Cases for Cisco Umbrella
sponsored by Cisco Umbrella
RESOURCE: The modern workplace has evolved to include remote access and mobile devices, while also introducing a new generation of complex security threats. In this e-book, 5 customers share the unique ways Cisco Umbrella protects their network. Read on to unlock the use cases.
Posted: 04 Mar 2020 | Published: 04 Mar 2020

Cisco Umbrella

Taking A “Prevent and Protect” Approach to Insider Data Breaches
sponsored by Egress Software Technologies Inc
VIDEO: As cyberattacks become occur more frequently than ever, organizations need to ensure their security efforts are focused on protecting from both external & internal threats. In this video, join the CPO of Egress in an overview of how an email security strategy can enhance regulatory compliance, reduce costs & increase profitability.
Posted: 03 Feb 2020 | Premiered: 23 Oct 2019

Egress Software Technologies Inc

Carnival Navigates Sea of Data With Splunk
sponsored by Splunk
WHITE PAPER: In this case study, learn how Carnival Corporation deployed the Splunk platform to increase visibility across all systems, secure shipboard systems and protect customer data. Since deploying Splunk, Carnival has seen many benefits.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Splunk

The Four Biggest Challenges to Keeping Modern Applications Secure
sponsored by Radware
WHITE PAPER: According to a recent study, just 33% of organizations feel their web application firewall (WAF) addresses all application-targeted threats. While implementing a WAF is an important starting point for ensuring the protection of modern apps, there are other key challenges and threats to consider. Download this report to learn more.
Posted: 24 Feb 2020 | Published: 24 Feb 2020

Radware

The 5 Most Dangerous New Attack Techniques: Are They Evolving?
sponsored by RSA Conference
WEBCAST: Each year at RSAC, SANS Institute reveals the most dangerous new attack techniques. On the list for 2019 were smartphone attacks, DNS manipulation, domain fronting, cloud-on-cloud attacks, CPU flaws and more. Watch this RSAC webcast to see the full—and accurate—list, plus the best methods to defeat these attacks.
Posted: 22 Jan 2020 | Premiered: Nov 19, 2019

RSA Conference

Mobile Payments Using Host Card Emulation with NFC
sponsored by ComputerWeekly.com
RESEARCH CONTENT: In this article from our Royal Holloway security series, we present a set of risks associated with using smartphones for contactless payment transactions.
Posted: 11 May 2018 | Published: 11 May 2018

ComputerWeekly.com

Cryptojacking: A Hidden Cost
sponsored by Panda Security
WHITE PAPER: Cryptojacking is one of the newest threats to cybersecurity in the last two years. Easy to carry out and difficult to detect, these attacks involve cybercriminals taking control of a third-party device's CPU to mine valuable cryptocurrencies. Download this white paper to learn more about the threat and how to protect your devices.
Posted: 28 Jan 2019 | Published: 28 Jan 2019

Panda Security

Airline Stops Automated Attacks on Web & Mobile
sponsored by Shape Security
CASE STUDY: A top 10 global airline was facing 2 major types of attacks including credential stuffing and fare scraping. When account lockouts peaked due to these attacks, the airline knew it needed to find a solution to stop credential stuffing attacks immediately. In this case study, learn why they decided to deploy Shape Enterprise Defense.
Posted: 20 Aug 2019 | Published: 20 Aug 2019

Shape Security

IT Buyers’ Guide for In-Vehicle Network Solutions
sponsored by CradlePoint
WHITE PAPER: In this buyers’ guide, learn about the multitude of connectivity options available for in-vehicle networking solutions and gain a better understanding of these options to help you make an informed buying decision.
Posted: 21 Apr 2020 | Published: 21 Apr 2020

CradlePoint

Why EDR Technologies are Essential for Endpoint Protection
sponsored by SearchSecurity.com
EBOOK: While an organization's most valuable and sensitive data and systems are usually well-protected on interior servers situated inside data centers and behind firewalls, it is on the network endpoints where external attacks begin. In this handbook, learn how to address endpoint security issues in your organization.
Posted: 20 Jun 2019 | Published: 20 Jun 2019

SearchSecurity.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info