IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Wireless Security

RSS Feed   
ALSO CALLED: mSecurity, Wireless LAN Security, Wi-Fi Security, Wireless Network Security, WLAN Security, Mobile Security
DEFINITION: Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection. Bluetooth is a high-speed but very short-range wireless technology for exchanging data between desktop and mobile computers, personal digital assistants (PDAs), and other devices. By exploiting a vulnerability in the way Bluetooth is implemented on a mobile phone, an attacker can access information -- such  … 

Wireless Security definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary
Wireless Security Reports
1 - 25 of 259 Matches Previous Page  |  Next Page
Spear Phishing: Top Threats and Trends
sponsored by Barracuda
WHITE PAPER: Business email compromise (BEC) is an emerging cybersecurity threat that targets user inboxes. While BEC makes up just 7% of spear-phishing attacks, it’s responsible for over $26 billion in losses in the last four years. In this report, explore the latest BEC tactics used by scammers and best practices for protecting your organization.
Posted: 18 May 2020 | Published: 30 Nov 2019

Barracuda

What Is Endpoint Detection and Response (EDR)?
sponsored by VMware International Unlimited Company
RESOURCE: As cyberattackers find more creative and elaborate ways of bypassing security measures and infect endpoint, the reactionary nature of traditional security tools is becoming increasingly ineffective. So, what can organizations do to proactively ensure the security of their critical endpoints? Read this article to find out.
Posted: 13 May 2020 | Published: 13 May 2020

VMware International Unlimited Company

13 Email Threat Types to Know about Right Now
sponsored by Barracuda
RESOURCE: As email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.
Posted: 07 May 2020 | Published: 01 May 2020

Barracuda

The Malicious Bot Playbook: Early Warning Signs, and What to Do About Them
sponsored by Cloudflare
WHITE PAPER: Similar to social engineering attacks, bot attacks are highly targeted to expose the vulnerabilities of a specific organization. Understanding the telltale bot warning signs has proven to be an effective measure at predicting and preventing attacks. This playbook outlines the common warning signs and tactics for addressing them.
Posted: 01 May 2020 | Published: 01 May 2020

Cloudflare

Replace AV Buyer’s Guide
sponsored by VMware International Unlimited Company
WHITE PAPER: When it comes to protecting your endpoints against cyberattacks, choosing the right solution that is easy to deploy, easy to manage and can cost-effectively protect your growing business is critical. This buyer’s guide is designed to ease the process by providing you with the knowledge you need to make your selection.
Posted: 30 Apr 2020 | Published: 30 Apr 2020

VMware International Unlimited Company

Barracuda Forensics and Incident Response
sponsored by Barracuda
VIDEO: When it comes to email-based threats, incident response is traditionally a manual process that costs time and money. In this short video, take a closer look at the key features of Barracuda Forensics and Incident Response, which is designed to replace outdated methods with an automated, data-driven approach.
Posted: 24 Apr 2020 | Premiered: 24 Apr 2020

Barracuda

The Risk of Network Layer and Application Layer DDoS Attacks
sponsored by OVH
EGUIDE: The deployment of 5G will open a lot of networking possibilities due to its improvements in speed, capacity and latency. Those advances, however, also open up the possibility for more severe attacks. In this e-guide, learn more about the threat of DDoS attacks and explore the differences between network layer and application layer DDoS attacks.
Posted: 22 Apr 2020 | Published: 22 Apr 2020

OVH

Ivanti Helps Companies Manage, Secure and Deliver IT for a Remote Workforce
sponsored by Ivanti SEA
RESOURCE: The recent spread of COVID-19 has led to record amounts of remote workers. As a result, home networks and devices have become the top target for cyberattackers looking to take advantage of a situation. In this blog post, discover the various ways Ivanti may be able to help alleviate these pain points.
Posted: 21 Apr 2020 | Published: 08 Apr 2020

Ivanti SEA

Protecting Business and Remote Workers from COVID-19 Email Threats
sponsored by Barracuda
VIDEO: The recent shift to working remotely as a result of the spread of COVID-19 has made organizations more vulnerable to email-based cyberattacks. This webinar breaks down the various methods being used by hackers and offers best practices for protecting your business and workers.
Posted: 21 Apr 2020 | Premiered: 21 Apr 2020

Barracuda

IT Buyers’ Guide for In-Vehicle Network Solutions
sponsored by CradlePoint
WHITE PAPER: In this buyers’ guide, learn about the multitude of connectivity options available for in-vehicle networking solutions and gain a better understanding of these options to help you make an informed buying decision.
Posted: 21 Apr 2020 | Published: 21 Apr 2020

CradlePoint

Securely Maintain Business Continuity with A Remote Workforce
sponsored by Cybereason
WHITE PAPER: In response to social distancing recommendations, organizations have had to rapidly enable their entire staff to work remotely. However, such a dramatic shift can often lead to security oversights, which result in vulnerabilities. Read on to unlock a checklist and ensure your organization didn’t miss any vital preparation steps.
Posted: 20 Apr 2020 | Published: 17 Mar 2020

Cybereason

Simplicity in Chaos
sponsored by Aruba Networks
WEBCAST: As the world continues to combat COVID-19, health organizations are quickly reinforcing Rapid Response teams with extra tools. In this webcast, learn how Aruba's wireless network products can help address modern chaos in healthcare, including sudden surges in critically ill patients, lack of space, and shortage of supplies.
Posted: 16 Apr 2020 | Premiered: Apr 7, 2020

Aruba Networks

MSPs Transform Their Endpoint Security
sponsored by Malwarebytes
CASE STUDY: In this collection of case studies, follow the journeys of three organizations (Optimus System, Sentrian, and Edge Computers) as they partner with Malwarebytes to navigate endpoint security challenges related to malware infections, downtime, ransomware, and more. Read on to get started.
Posted: 14 Apr 2020 | Published: 14 Apr 2020

Malwarebytes

WEBINAR: Protecting Against Coronavirus Email Fraud
sponsored by Armorblox
VIDEO: Socially engineered attacks are always aligned with what people are talking (or worried) about. So, it should come as no surprise that record amounts of cyberattacks have been using the current Coronavirus pandemic as a lure to cause disruptions. Watch this webinar to learn more about their tactics and how to spot them.
Posted: 14 Apr 2020 | Premiered: 08 Apr 2020

Armorblox

Webinar: Managing the Cybersecurity Risk of Your Growing Remote Workforce
sponsored by Automox
WEBCAST: Due to recent events, the workforce has completely shifted, and organizations are forced to adopt remote work policies. In this webinar, join two Automox security experts as they offer insight into seamlessly transitioning your security posture (including endpoints and mobile devices) to reflect the changes in your workforce.
Posted: 09 Apr 2020 | Premiered: Apr 9, 2020


Augmenting Native Office 365 Email Security to Stop Targeted Email Attacks
sponsored by Armorblox
WHITE PAPER: Email remains the top communication method within and among businesses. In order to take advantage of this, cyberattackers develop targeted campaigns that focus on tricking users into clicking on malware. In this white paper, learn how to complement your existing Office 365 security features with third-party services to stop email attacks.
Posted: 09 Apr 2020 | Published: 09 Apr 2020

Armorblox

Remote Work Considerations: Securing the New Corporate Network
sponsored by EvolveIP
WHITE PAPER: Today’s environments have embraced SaaS offerings, realizing scalability and cost benefits. However, each additional SaaS provider adds another disparate system to the environment, potentially exposing security vulnerabilities. In this white paper, explore key considerations your security team should make when enabling remote workers.
Posted: 07 Apr 2020 | Published: 07 Apr 2020

EvolveIP

4 Actions to Secure Work from Home Employees
sponsored by Ping Identity Corporation
WEBCAST: Current events have led to a sudden and dramatic shift towards remote workers and devices. Even though identity and access management has been a trend in cybersecurity for some time, the massive shift towards working from home has made this paramount. In this webinar, discover 4 actions you can take to secure remote workers.
Posted: 02 Apr 2020 | Premiered: Apr 2, 2020

Ping Identity Corporation

Alero Intro
sponsored by CyberArk Software, Inc
VIDEO: In this short video, take a high-level look at some of the key features and capabilities of CyberArk Alero, which enables IT security teams to grant remote access to third parties – without the need for VPNs, passwords or agent. Watch now to learn more.
Posted: 25 Mar 2020 | Premiered: 25 Mar 2020

CyberArk Software, Inc

Alero Showcase
sponsored by CyberArk Software, Inc
VIDEO: In this short video, you’ll discover a walk-through demonstration of CyberArk Alero, a platform for enabling third-party vendors with secure, remote access – without the need for VPNs, passwords or agents. Watch now to learn more.
Posted: 24 Mar 2020 | Premiered: 24 Mar 2020

CyberArk Software, Inc

Magic Quadrant for Secure Web Gateways
sponsored by Menlo Security
RESOURCE: Secure web gateways (SWGs) are becoming a staple at most organizations, allowing them to secure endpoints and devices existing outside the perimeter. In this Magic Quadrant report, Gartner evaluates key SWG offerings in today’s market to help you determine the right vendor for your needs. Read on to unlock the full report.
Posted: 18 Mar 2020 | Published: 11 Nov 2019

Menlo Security

Intelligent Cloud Identity Platform
sponsored by SailPoint Technologies
WHITE PAPER: Digital transformation enables organizations to improve their agility and growth, allowing for increased productivity. However, this change also bring increasingly distributed workforces, which exposes an organization to potential risk. So, what can IT security leaders do to meet this risk? Download this white paper to find out.
Posted: 17 Mar 2020 | Published: 17 Mar 2020

SailPoint Technologies

Top 5 Use Cases for Cisco Umbrella
sponsored by Cisco Umbrella
EBOOK: The modern workplace has evolved to include remote access and mobile devices, while also introducing a new generation of complex security threats. In this e-book, 5 customers share the unique ways Cisco Umbrella protects their network. Read on to unlock the use cases.
Posted: 17 Mar 2020 | Published: 17 Mar 2020

Cisco Umbrella

Machina Tools — SDKs
sponsored by Ionic Security
PRODUCT OVERVIEW: An issue plaguing today’s networks is the siloed approach to security and management, allowing hackers to exploit the gaps and enter your network. In this solution brief, take a closer look at Ionic’s Machina Tools, designed to close these gaps and unify your security strategy.
Posted: 05 Mar 2020 | Published: 05 Mar 2020

Ionic Security

Endpoint Protection Platforms: Analyst Report
sponsored by Trend Micro
RESOURCE: In this Magic Quadrant report, Gartner assesses key vendors within the endpoint security market to provide a comprehensive evaluation of the current tools and platforms. Read on to uncover the findings & discover which endpoint protection platform may be the best-fit for your organization’s needs.
Posted: 05 Mar 2020 | Published: 20 Aug 2019

Trend Micro
1 - 25 of 259 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info