IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Wireless Security

RSS Feed   
ALSO CALLED: mSecurity, Wireless LAN Security, Wi-Fi Security, Wireless Network Security, WLAN Security, Mobile Security
DEFINITION: Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection. Bluetooth is a high-speed but very short-range wireless technology for exchanging data between desktop and mobile computers, personal digital assistants (PDAs), and other devices. By exploiting a vulnerability in the way Bluetooth is implemented on a mobile phone, an attacker can access information -- such  … 

Wireless Security definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary
Wireless Security Reports
1 - 25 of 256 Matches Previous Page  |  Next Page
DNS Security with Meraki MR & Umbrella
sponsored by Cisco Meraki - APAC
WHITE PAPER: This white paper explores how to update DNS security so that you can address the potential attacks from malicious actors hiding in the bevy of DNS traffic. Find out what steps you can take to improve your security posture, and learn about the integration of Cisco Umbrella and Meraki's wireless access points.
Posted: 12 Dec 2018 | Published: 30 Sep 2018

Cisco Meraki - APAC

Rethinking Dorm Wi-Fi
sponsored by Cisco Meraki - APAC
RESOURCE: Learn how higher education institutions are delivering high-bandwidth, versatility, and easy management Wi-Fi to their users, so your organization can do the same.
Posted: 07 Dec 2018 | Published: 07 Dec 2018

Cisco Meraki - APAC

Wireless Connectivity Solutions for Open Pit Mining
sponsored by Cambium Networks
CASE STUDY: Mining companies that use wireless communications often work in remote locations, which make connecting to wireless internet difficult. Read this resource to learn about the tool that mining companies are using to increase productivity in even the most remote of locations.
Posted: 12 Nov 2018 | Published: 12 Nov 2018

Cambium Networks

The Business Case for MobileIron Threat Defense
sponsored by MobileIron
RESOURCE: Uncover some of the best practices that other organizations, like yours, have used to implement a layered security strategy, to improve their mobile security.
Posted: 03 Oct 2018 | Published: 03 Oct 2018

MobileIron

Modern-Day Security Tales
sponsored by Cisco Umbrella
RESOURCE: Read through this creative security storybook and discover the many anxieties that can plague you and other security professionals. If you share some of these feelings, you may want to consider a new security tool.
Posted: 07 Sep 2018 | Published: 07 Sep 2018

Cisco Umbrella

Bringing Security to the Perimeter of your Cloud Network
sponsored by Cisco Umbrella
WHITE PAPER: With the change in how employees work and access data, organizations need new, always-on security protections that perimeter and endpoint security solutions can't deliver. In this white paper, explore insights into VPN, DNS, and IP layer usage, risks, and protection.
Posted: 07 Sep 2018 | Published: 31 May 2016

Cisco Umbrella

Simple and Smart Security for the Enterprise Cloud
sponsored by MobileIron
RESOURCE: Download this resource to learn about a new security framework that allows your organization to confidently adopt mobile-cloud technologies while reducing the risk of data breaches.
Posted: 24 Aug 2018 | Published: 24 Aug 2018

MobileIron

Mid-Year Global Threat Report 2018
sponsored by MobileIron
RESOURCE: Explore this mid-year 2018 report as it provides insights into how attackers are targeting enterprise customers via mobile device, network, applications, and operating system vulnerabilities.
Posted: 22 Aug 2018 | Published: 22 Aug 2018

MobileIron

The Criminal Justice Information Services (CJIS) Compliance for Mobile Devices
sponsored by MobileIron
RESOURCE: The FBI's Criminal Justice Information Services (CJIS) Security Policy defines security requirements for the entire industry. Download this resource to learn how your organization's mobile device management policy can comply with CJIS standards.
Posted: 22 Aug 2018 | Published: 22 Aug 2018

MobileIron

Mobile Payments Using Host Card Emulation with NFC
sponsored by ComputerWeekly.com
RESEARCH CONTENT: In this article from our Royal Holloway security series, we present a set of risks associated with using smartphones for contactless payment transactions.
Posted: 11 May 2018 | Published: 11 May 2018

ComputerWeekly.com

Potential ROI and Benefits of ServiceNow Security Operations
sponsored by ServiceNow
RESEARCH CONTENT: This report provides a framework for evaluating the potential financial impact of investing in ServiceNow Security Operations to improve security incident and vulnerability response processes.
Posted: 18 Jan 2018 | Published: 31 Jan 2018

ServiceNow

Modern Management of Windows Devices with VMware Workspace One
sponsored by VMware
RESOURCE: Discover ways your organization can let its employees work with a wide range of devices, on site or remote, while maintaining security and compliance through a unified management platform.
Posted: 17 Aug 2018 | Published: 17 Aug 2018

VMware

Predictive Mobile Threat Defense
sponsored by Symantec
WHITE PAPER: Explore the next-generation mobile security technologies and threat defense strategies that leverage pervasive analytics to predictively identify threats and proactively stop attacks without disrupting users' mobile productivity.
Posted: 09 Aug 2018 | Published: 09 Aug 2018

Symantec

3 Secrets to Becoming a Mobile Security Superhero
sponsored by Symantec
WHITE PAPER: Organizations are advised develop a consensus about adopting modern, advanced security technologies to protect mobile devices. Download to reveal 3 secrets that'll help you convince business leaders to buy-into mobile cybersecurity.
Posted: 08 Aug 2018 | Published: 31 Dec 2017

Symantec

How to Detect Unknown Malware and Ransomware
sponsored by Splunk
WHITE PAPER: Explore two analytical strategies that can help you detect unknown malware activity and early signs of compromise in a Windows environment. Discover how these approaches work in real-time to detect advanced threats faster.
Posted: 02 Aug 2017 | Published: 02 Aug 2017

Splunk

Setting a New Quality Standard for Hotel Wi-Fi Case: Riu Hotels
sponsored by Ekahau
CASE STUDY: Learn how RIU Hotels was able to provide their hotel with the Wi-Fi needed to meet and exceed guests' expectations in this concise case study.
Posted: 09 Jun 2017 | Published: 30 Dec 2016

Ekahau

Wi-Fi: Secure Enough for The Federal Government?
sponsored by HPE and IntelĀ® Corporate
WHITE PAPER: As Wi-Fi continues to evolve, so does its security functionality. But is it secure enough to protect the US Federal Government? In this white paper, get a detailed, technical explanation of how modern enterprise Wi-Fi networks are secured, and whether Wi-Fi has the ability to fully protect the federal government.
Posted: 08 Jun 2017 | Published: 30 Sep 2016

HPE and IntelĀ® Corporate

SDN Can Help Unify Wired and Wireless Campus Networks
sponsored by Brocade
EGUIDE: In this expert e-guide, learn how SDN controllers can give your Wi-Fi and Ethernet switch-based campus networks the support they need for a successful unification.
Posted: 01 Feb 2017 | Published: 31 Jan 2017

Brocade

Wireless Security Protocols: The Difference Between WEP, WPA, WPA2
sponsored by Brocade
EGUIDE: In wireless security, passwords are only half the battle. Choosing the proper level of encryption is just as vital. In this expert e-guide, learn the differences between the three wireless encryption standards: Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA) and Wi-Fi Protected Access (WPA).
Posted: 01 Feb 2017 | Published: 31 Jan 2017

Brocade

Cyber Threats to Online Shopping Cheer
sponsored by Neustar
WHITE PAPER: Learn how to protect your brand and stay online during high-volume occasions. See statistics on current online shopping trends and discover how to stop fraudulent actors before they can damage your organization.
Posted: 03 Oct 2016 | Published: 31 Dec 2016

Neustar

Malware Hitching a Ride on Mobile Apps?
sponsored by SearchSecurity.com
EBOOK: The latest mobile app security threats ride into enterprises on employee devices, but you can learn the latest strategies for improving corporate BYOD security.
Posted: 27 Jun 2016 | Published: 20 Jun 2016

SearchSecurity.com

Mastering the Top Enterprise Mobility Challenges
sponsored by Microsoft
EGUIDE: Mobility is bringing new concerns that didn't exist with desktops. Protecting company data while staying compliant is a new challenge for IT admins. This e-guide explores how to handle the top five issues in today's mobile world.
Posted: 14 Jun 2016 | Published: 08 Jun 2016

Microsoft

It's time to tackle IoT security
sponsored by Ruckus Wireless
EGUIDE: The forecasts for IoT are huge. Some suggest that there will be 50 billion devices connected by 2020. Whether or not that prediction is accurate, it's clear that IoT is gaining meaningful market momentum, buoyed by an endless array of applications. Unfortunately, they are creating a multitude of security vulnerabilities and attack surfaces.
Posted: 09 Mar 2016 | Published: 07 Mar 2016

Ruckus Wireless

Securing Your Network in the Wireless Age
sponsored by Aruba Networks
EGUIDE: In this e-guide, you will learn how enterprise WLAN is growing in size and importance, driving up the need for more secure wireless network. Find out how vulnerable your wireless network could be and what happens when WLAN security is ignored.
Posted: 01 Mar 2016 | Published: 24 Feb 2016

Aruba Networks

Secure Your Internal Corporate Networks With ABAC
sponsored by Cryptzone
EGUIDE: In this e-guide, discover how ABAC can provide your network with a robust security method that addresses security issues caused by growing remote access and BYOD trends. You will also learn how continuous network security monitoring can allow your enterprise to detect and prevent future cyber-attacks from occurring.
Posted: 27 Jan 2016 | Published: 25 Jan 2016

Cryptzone
1 - 25 of 256 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement