IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Wireless Security

RSS Feed   
ALSO CALLED: mSecurity, Wireless LAN Security, Wi-Fi Security, Wireless Network Security, WLAN Security, Mobile Security
DEFINITION: Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection. Bluetooth is a high-speed but very short-range wireless technology for exchanging data between desktop and mobile computers, personal digital assistants (PDAs), and other devices. By exploiting a vulnerability in the way Bluetooth is implemented on a mobile phone, an attacker can access information -- such  … 

Wireless Security definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary
Wireless Security Reports
1 - 25 of 250 Matches Previous Page  |  Next Page
How to Provide a Safe Learning Environment
sponsored by Absolute Software Corporation
WHITE PAPER: Technology has become a fundamental part of the education system, and it’s likely to continue as a classroom trend. However, these devices also present risks to students and schools. Download this white paper to uncover 3 approaches your organization should adopt in order to ensure a safer learning environment.
Posted: 18 Feb 2020 | Published: 18 Feb 2020

Absolute Software Corporation

Euromonitor
sponsored by Absolute Software Corporation
CASE STUDY: In this case study, discover how Euromonitor, a business intelligence and strategic analysis provider, partnered with Absolute to shift their security focus towards their proprietary market research and automate endpoint visibility to track (and potentially wipe) at-risk devices.
Posted: 18 Feb 2020 | Published: 09 May 2019

Absolute Software Corporation

Webinar: Inside the World of Social Media Phishing: Financial Scams
sponsored by PhishLabs
WEBCAST: Security teams looking to protect their organization and its users against phishing attacks should be aware of the increase in scammers targeting social media accounts. In this webinar, discover how social media is being used to conduct financial scams and explore several real-world examples of campaign tactics.
Posted: 18 Feb 2020 | Premiered: Feb 18, 2020

PhishLabs

Webinar: Proactively Protect Users with Email Incident Response
sponsored by PhishLabs
WEBCAST: Phishing attacks are growing in their frequency, and the damage caused by these campaigns is increasingly costly. It’s more critical than ever for security leaders to reconsider how they approach phishing detection. In this webinar, discover the key characteristics of an effective program and view a demo of PhishLabs’ Email Incident Response.
Posted: 18 Feb 2020 | Premiered: Feb 18, 2020

PhishLabs

KCOM
sponsored by Absolute Software Corporation
CASE STUDY: In this case study, discover how KCOM, a UK-based systems integrator, partnered with Absolute to address the increasing demands of their increasingly dispersed workforce without sacrificing compliance or operational efficiency.
Posted: 17 Feb 2020 | Published: 13 May 2019

Absolute Software Corporation

The Email Incident Response Playbook
sponsored by PhishLabs
WHITE PAPER: Just as technology advances, so too do the tactics used in cyberattacks. Phishing tactics have grown in their complexity, and traditional detection methods are incapable of adequate security. Download this playbook to discover how to build an incident response program that can detect, isolate and respond to phishing attack.
Posted: 17 Feb 2020 | Published: 17 Feb 2020

PhishLabs

How to Handle Phishing Threats That Bypass Email Security Technology
sponsored by PhishLabs
WHITE PAPER: The scope of phishing attacks has evolved beyond email over recent years to malicious attempts within any digital medium. In this white paper, take a closer look at modern phishing tactics, where they’re likely to strike and best practices for mitigating these threats.
Posted: 17 Feb 2020 | Published: 17 Feb 2020

PhishLabs

The Root Of (Almost) All Security Issues
sponsored by Tala Security
WHITE PAPER: In order to establish adequate data protection, security teams need to ensure they address both technical (code and data) & non-technical (user behavior) risks. In this white paper, Sanjay Sawhney, VP of Engineering at Tala, highlights how these issues lead to significant disruptions and offers best practices for addressing them.
Posted: 17 Feb 2020 | Published: 17 Feb 2020

Tala Security

SLED - 3 Easy Ways to Secure Your K-12 School District
sponsored by Cisco Umbrella
RESOURCE: Deployed in 3 simple steps, Cisco Umbrella secures your entire school district in minutes. Easily protect students and staff against phishing attacks, filter content, and gain visibility into all activity, on or off-campus. Download this infographic to learn more.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

Cisco Umbrella

Prevent Browser-Injected Ads from Hijacking Your Customers
sponsored by Tala Security
WHITE PAPER: By eliminating browser-injected ads, you can enhance customer experience on your website, which can lead to increased conversions, reduced shopping cart abandonment, and more. But what is the best way to go about blocking unwanted ads? Download this white paper to learn more.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

Tala Security

SIG - More Organizations are Using a Secure Internet Gateway for Secure Access
sponsored by Cisco Umbrella
WHITE PAPER: What if you could provide workers with safe access to the internet — no matter what device they’re using or where they’re located, even if they aren’t on the VPN? A Secure Internet Gateway (SIG) provides just that. Download this trend report to unlock an in-depth analysis of SIG.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Cisco Umbrella

Fayolle Preempts Cyberattacks and Persistent Threats
sponsored by Malwarebytes
CASE STUDY: In this case study, follow the story of Fayolle, a French engineering and construction company, as they partner with Malwarebytes to address the rise in cyberattacks as a result of a cloud environment transition. Download the study now to uncover Fayolle’s results.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Malwarebytes

Chart Industries Vaporizes Ransomware and Malware
sponsored by Malwarebytes
CASE STUDY: In this case study, follow the journey of Chart Industries, a global manufacturer and distributer, as they partner with Malwarebytes to address the growing risk of malware and phishing attacks targeted at mobile workers and endpoints. Download the report to see the results.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Malwarebytes

Case Study: Quanta Services
sponsored by Chronicle
CASE STUDY: In this case study, join James Stinson, VP of IT at Quanta Services, a skilled workforce contractor in North America, as he highlights the company’s journey towards cybersecurity and their partnership with Chronicle to establish a security analytics platform.
Posted: 10 Feb 2020 | Published: 31 Oct 2019

Chronicle

The Cost of a Data Breach in Healthcare
sponsored by Absolute Software Corporation
WHITE PAPER: Today’s healthcare organizations are facing constant threats from hackers attempting to steal PHI. Security teams are tasked with protecting patient data while facilitating an increasingly mobile workforce. In this white paper, take a closer look at the threats within the healthcare industry by reviewing some unfortunate breaches.
Posted: 10 Feb 2020 | Published: 08 Jan 2019

Absolute Software Corporation

Bovis Homes
sponsored by Absolute Software Corporation
CASE STUDY: In this case study, follow the journey of Bovis Homes, a residential development company in the UK, as they partner with Absolute Software to establish visibility and control over their disparate mobile endpoints to ensure security and meet GDPR compliance.
Posted: 10 Feb 2020 | Published: 25 Jun 2019

Absolute Software Corporation

The state of mobile app security 2020
sponsored by Intertrust
WHITE PAPER: Employees today use 3 different devices in their daily routine – that number is expected to increase as organizations continue to adopt IoT. With the amount of sensitive data within mobile apps, ensuring their protection is paramount. In this report, explore key statistics and strategic insights for mobile app security in 2020.
Posted: 10 Feb 2020 | Published: 10 Feb 2020

Intertrust

Cybersecurity and Education: The State of the Digital District in 2020
sponsored by Absolute Software Corporation
WHITE PAPER: Technology in the classroom is on the rise, and securing these critical endpoints grows increasingly challenging for K-12 IT teams. In 2019 alone, 49 separate school districts were victims of ransomware attacks. Check out this research report to learn more about the security threats and tactics plaguing our school systems.
Posted: 07 Feb 2020 | Published: 07 Feb 2020

Absolute Software Corporation

L.A. Tourism and Convention Board
sponsored by Absolute Software Corporation
CASE STUDY: As a non-profit organization, LA Tourism’s IT team is under tremendous pressure to ensure security while remaining efficient with limited resources. Download this case study and follow LA Tourism’s journey as they partner with Absolute to establish a security strategy that improved compliance and network visibility.
Posted: 07 Feb 2020 | Published: 06 May 2019

Absolute Software Corporation

Core - DNS - Employees Like to Use Unsanctioned Apps - and Don’t Plan to Stop
sponsored by Cisco Umbrella
WHITE PAPER: It’s an unfortunate truth that employees are going to download unsanctioned apps. While these apps may boost productivity, they also expose your network to risk. Don’t wait for threats to strike – download this white paper and discover a new approach to network security that means no more playing defense.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

Cisco Umbrella

Rethinking Data Protection: The Human-centric Approach
sponsored by Forcepoint
EBOOK: It’s predicted that there will be 1.87 billion mobile workers worldwide by 2022, representing 42.5% of the global workforce. As mobile devices grow, the idea of a traditional perimeter begins to fade. Download this e-book and learn why organizations are adopting a user & data-centric approach to multi-cloud security.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

Forcepoint

Securing Your Wherever Whenever Workforce
sponsored by Forcepoint
EBOOK: Currently, 87% of organizations rely on employee access to business apps from personal devices. While BYOD trend allows for unhindered agility and collaboration, it also invites additional security risks. In this e-book, uncover the truth about cloud security, and learn how to optimize your mobile-cloud security strategy.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

Forcepoint

SIG - Security Readout: 2019 Trends for Remote and Roaming User Security
sponsored by Cisco Umbrella
WHITE PAPER: In this research readout, take a closer look at the top trends in remote and roaming user security throughout 2019 and explore the challenges of distributed environment security and the solutions best positioned to these challenges.
Posted: 05 Feb 2020 | Published: 05 Feb 2020

Cisco Umbrella

Core - DNS - Punycode: Awareness and Protection
sponsored by Cisco Umbrella
WEBCAST: Have you ever come across a domain name that was almost identical to a familiar site, but instead was a malicious link? If so, you’ve likely come across a specific kind of attack known as Punycode. In this short webinar, explore Punycode: what it is, how it is commonly used, why it’s important & examples to keep an eye out for.
Posted: 04 Feb 2020 | Premiered: Dec 16, 2019

Cisco Umbrella

What is the CCPA & How Will it Affect Email Security?
sponsored by Egress Software Technologies Inc
VIDEO: This video explains the the significance and implications of California’s new data privacy regulations, specifically focusing on how they will affect email use among employees. Watch now to learn more.
Posted: 04 Feb 2020 | Premiered: 08 Nov 2019

Egress Software Technologies Inc
1 - 25 of 250 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info