IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Wireless Security

RSS Feed   
ALSO CALLED: mSecurity, Wireless LAN Security, Wi-Fi Security, Wireless Network Security, WLAN Security, Mobile Security
DEFINITION: Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection. Bluetooth is a high-speed but very short-range wireless technology for exchanging data between desktop and mobile computers, personal digital assistants (PDAs), and other devices. By exploiting a vulnerability in the way Bluetooth is implemented on a mobile phone, an attacker can access information -- such  … 

Wireless Security definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary
Wireless Security Reports
1 - 25 of 243 Matches Previous Page  |  Next Page
CradlePoint Wireless Networks Study — Australia 2020
sponsored by CradlePoint
ANALYST REPORT: Connectivity is essential for business. While that’s nothing new, the brushfires and implications of COVID-19 in Australia have put the spotlight firmly on the need for more and better connectivity options. In this Cradlepoint Wireless Networks Study, learn how IT decision makers in medium to large organizations plan to use 5G to their advantage.
Posted: 23 Oct 2020 | Published: 23 Oct 2020

CradlePoint

Key Considerations for Securing 5G Network Traffic
sponsored by Verizon
WHITE PAPER: The growth of enterprise data is putting pressure on technology professionals to secure and govern it. The generation, networking and storage of this data means that 5G will affect every company’s security posture. So, how can you be prepared for what’s coming? Read this white paper to learn how 5G security will be influenced by evolving threats.
Posted: 22 Oct 2020 | Published: 22 Oct 2020

Verizon

Sacramento Regional Transit District Used Connected Buses to Serve Communities During Pandemic
sponsored by CradlePoint
VIDEO: The Sacramento Regional Transit District (SacRT) was looking to find additional ways to support the community during an extended period of low ridership. What they did was equip buses with wireless edge solutions to create “super hotspots” in areas where many people didn’t have internet access. Read this short brief to learn the details.
Posted: 21 Oct 2020 | Premiered: 09 Oct 2020

CradlePoint

Assuring the Promise of a Secure 5G Future: 5 Steps to Taming the Complexity and Exploiting 5G Opportunities
sponsored by Spirent
WHITE PAPER: 5G will radically improve mobile broadband services, enable connectivity to billions of global devices and create an IoT boom. So what’s holding up 5G deployment in real-world use cases? The answer is security – particularly in that 5G networks need to be tested and validated. Read this white paper to learn 5 steps to 5G security.
Posted: 16 Oct 2020 | Published: 31 Jul 2019

Spirent

Prisma Access BP Webinar
sponsored by Palo Alto Networks
WEBCAST: Due to COVID-19, the notion of remote access has evolved and expanded to allow students to remotely connect to classes, doctors to securely connect to their patients and remote workers to connect to the applications and resources they need. In this webcast, learn more about how secure remote access is evolving and how a SASE approach can help.
Posted: 14 Oct 2020 | Premiered: Oct 14, 2020

Palo Alto Networks

Spear Phishing: The Targeted Attacks that Aim for Your Business
sponsored by Vade Secure
WHITE PAPER: Phishing and spear phishing are two of the most common types of cyberattacks. In a growing digital economy, technological assets are coming under greater threat from these two very similar attacks. How do you identify a phishing attack, and how can you take a proactive approach? Read this white paper to learn the answers.
Posted: 21 Sep 2020 | Published: 21 Sep 2020


Twitter Phone Spear Phishing Attack
sponsored by Lookout
WHITE PAPER: On July 15th, 2020, Twitter experienced a security incident where a malicious actor gained access to the back-end account management console through a phone spear phishing campaign. 130 accounts, including those of Barack Obama, Bill Gates and Elon Musk, were affected. Read this white paper to learn specifics and recommendations.
Posted: 21 Sep 2020 | Published: 21 Sep 2020

Lookout

Close the Gap In Device Security
sponsored by HP Inc
WHITE PAPER: Today, endpoints are a key target for threat actors, and a shortage in talent isn’t helping. Security professionals have figured out that innovation is necessary for endpoint security, so where can you start? Read this white paper to learn RFP requirements and protect your organization.
Posted: 15 Sep 2020 | Published: 28 Jun 2019

HP Inc

Teach & Learn From Anywhere
sponsored by CradlePoint
WEBCAST: A recent survey showed that only 8% of Americans believe that schools can return to normal. This may be a good thing, - 78% of people worldwide believe that online learning will expand access to education globally. The result will be all-time high internet access demand. Watch this webcast to learn how wireless WAN can optimize learning-from-home.
Posted: 04 Sep 2020 | Premiered: Sep 4, 2020

CradlePoint

Protect Your Network Before Attacks Evolve
sponsored by Claranet
WEBCAST: Your most sensitive data lives on the endpoint and in the cloud. Fast reactions prevent potential breaches and require a combination of technology and resource. Watch this webinar on endpoint detection and response (EDR) demonstrating how you can fortify the edge with real-time monitoring and detection of malicious events on endpoints.
Posted: 24 Aug 2020 | Premiered: Aug 7, 2020

Claranet

Cradlepoint NetCloud Work From Anywhere Solution vs. Consumer Grade Hotspots
sponsored by CradlePoint
DATA SHEET: Is your organization looking for a way to easily manage all of your devices at scale through the cloud, from anywhere? Is it important that you deploy consistent security policies to all of your routers? View this data sheet for an in-depth look at a solution that includes wireless routers with enterprise-class reliability, security and management.
Posted: 24 Aug 2020 | Published: 24 Aug 2020

CradlePoint

Reliable Access to the Internet is Key to Distance Learning
sponsored by CradlePoint
DATA SHEET: An adaptable network must be in place in order for students to continue learning. New approaches to networking are required. Students must be able to reliably access the internet, and teachers must be able to access cloud applications – and it must all be secure. Read this white paper to learn the importance of LTE connectivity during this time.
Posted: 21 Aug 2020 | Published: 21 Aug 2020

CradlePoint

Covid-19 & the New Normal for E-commerce
sponsored by Tala Security
WHITE PAPER: While online shopping has increased dramatically since the beginning of the pandemic, so too have threats targeting shoppers and other users. In fact, Magecart attacks have increased by 20%. Read on to explore how COVID-19 is shifting the e-commerce landscape and discover the long-term implications of these changes.
Posted: 20 Aug 2020 | Published: 20 Aug 2020

Tala Security

Case Study: Aspen Skiing Company
sponsored by Chronicle
CASE STUDY: In this case study, discover how the Aspen Skiing Company, owners and operators of a world-famous ski resort, partnered with Chronicle to address the various endpoint visibility, security and investigation challenges they were facing as a result seasonal staff and limited resources.
Posted: 19 Aug 2020 | Published: 19 Aug 2020

Chronicle

Secure, Cloud-Controlled Network to Enable Work From Home
sponsored by CradlePoint
WHITE PAPER: When organizations plan for employees to work remote, they must consider both security and bandwidth, and uncover ways for these two to be compromised or effortlessly seamed together. Which route does your department choose to go? Do you have plans for edge computing? Browse this solution brief to learn more about modernizing your network.
Posted: 10 Aug 2020 | Published: 10 Aug 2020

CradlePoint

Cyberattacks on Mobile Devices are on the Rise
sponsored by Verizon
WHITE PAPER: 5G networks promise increased security, but as it stands now, many organizations need to implement their own mobile security measures. Greater functionality means greater vulnerability, and your network must be ready. This article describes the new threat landscape that arrives with 5G and tells you how your organization can prepare.
Posted: 13 Jul 2020 | Published: 13 Jul 2020

Verizon

Spear Phishing: Top Threats and Trends
sponsored by Barracuda
WHITE PAPER: Business email compromise (BEC) is an emerging cybersecurity threat that targets user inboxes. While BEC makes up just 7% of spear-phishing attacks, it’s responsible for over $26 billion in losses in the last four years. In this report, explore the latest BEC tactics used by scammers and best practices for protecting your organization.
Posted: 18 May 2020 | Published: 30 Nov 2019

Barracuda

What Is Endpoint Detection and Response (EDR)?
sponsored by VMware International Unlimited Company
RESOURCE: As cyberattackers find more creative and elaborate ways of bypassing security measures and infect endpoint, the reactionary nature of traditional security tools is becoming increasingly ineffective. So, what can organizations do to proactively ensure the security of their critical endpoints? Read this article to find out.
Posted: 13 May 2020 | Published: 13 May 2020

VMware International Unlimited Company

13 Email Threat Types to Know about Right Now
sponsored by Barracuda
RESOURCE: As email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.
Posted: 07 May 2020 | Published: 01 May 2020

Barracuda

The Malicious Bot Playbook: Early Warning Signs, and What to Do About Them
sponsored by Cloudflare
WHITE PAPER: Similar to social engineering attacks, bot attacks are highly targeted to expose the vulnerabilities of a specific organization. Understanding the telltale bot warning signs has proven to be an effective measure at predicting and preventing attacks. This playbook outlines the common warning signs and tactics for addressing them.
Posted: 01 May 2020 | Published: 01 May 2020

Cloudflare

Replace AV Buyer’s Guide
sponsored by VMware International Unlimited Company
WHITE PAPER: When it comes to protecting your endpoints against cyberattacks, choosing the right solution that is easy to deploy, easy to manage and can cost-effectively protect your growing business is critical. This buyer’s guide is designed to ease the process by providing you with the knowledge you need to make your selection.
Posted: 30 Apr 2020 | Published: 30 Apr 2020

VMware International Unlimited Company

Barracuda Forensics and Incident Response
sponsored by Barracuda
VIDEO: When it comes to email-based threats, incident response is traditionally a manual process that costs time and money. In this short video, take a closer look at the key features of Barracuda Forensics and Incident Response, which is designed to replace outdated methods with an automated, data-driven approach.
Posted: 24 Apr 2020 | Premiered: 24 Apr 2020

Barracuda

The Risk of Network Layer and Application Layer DDoS Attacks
sponsored by OVH
EGUIDE: The deployment of 5G will open a lot of networking possibilities due to its improvements in speed, capacity and latency. Those advances, however, also open up the possibility for more severe attacks. In this e-guide, learn more about the threat of DDoS attacks and explore the differences between network layer and application layer DDoS attacks.
Posted: 22 Apr 2020 | Published: 22 Apr 2020

OVH

Protecting Business and Remote Workers from COVID-19 Email Threats
sponsored by Barracuda
VIDEO: The recent shift to working remotely as a result of the spread of COVID-19 has made organizations more vulnerable to email-based cyberattacks. This webinar breaks down the various methods being used by hackers and offers best practices for protecting your business and workers.
Posted: 21 Apr 2020 | Premiered: 21 Apr 2020

Barracuda

IT Buyers’ Guide for In-Vehicle Network Solutions
sponsored by CradlePoint
WHITE PAPER: In this buyers’ guide, learn about the multitude of connectivity options available for in-vehicle networking solutions and gain a better understanding of these options to help you make an informed buying decision.
Posted: 21 Apr 2020 | Published: 21 Apr 2020

CradlePoint
1 - 25 of 243 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info