IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Wireless Security

RSS Feed   
ALSO CALLED: mSecurity, Wireless LAN Security, Wi-Fi Security, Wireless Network Security, WLAN Security, Mobile Security
DEFINITION: Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection. Bluetooth is a high-speed but very short-range wireless technology for exchanging data between desktop and mobile computers, personal digital assistants (PDAs), and other devices. By exploiting a vulnerability in the way Bluetooth is implemented on a mobile phone, an attacker can access information -- such  … 

Wireless Security definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary
Wireless Security Reports
1 - 25 of 238 Matches Previous Page  |  Next Page
Smart Buildings: Establishing Trust with IoT Security
sponsored by Archetype
RESOURCE: An increasing number of business leaders now see the value of using IoT devices to provide data and insight into the indoor environment, and they’re calling these new smarter spaces ‘connected spaces’. So, what are the benefits of these new spaces, and what hurdles need to be overcome? Read this article to find out.
Posted: 24 Nov 2020 | Published: 24 Sep 2020

Archetype

Enterprise Wi-Fi 6 Goes Mainstream
sponsored by CommScope
WHITE PAPER: As performance remains a top concern for Wi-Fi users, enterprises are adopting the latest version: Wi-Fi 6. By reading this white paper, you can explore the scale of Wi-Fi 6 adoption, its prospective effect on business productivity and how it could pave the way for technologies such as IoT.
Posted: 17 Nov 2020 | Published: 25 Jun 2020

CommScope

Webinar – Ruckus Wireless: Wi-Fi 6
sponsored by CommScope
WEBCAST: The next generation of wireless connectivity, Wi-Fi 6, is coming, and with it, a host of improvements in network performance. View this webinar to delve into the technology enhancements Wi-Fi 6 will deliver, who might benefit and real-world enterprise use cases. Network managers will learn what to do now to capitalize on the transition to Wi-Fi 6.
Posted: 16 Nov 2020 | Premiered: Nov 16, 2020

CommScope

Work From Anywhere: The Mission-Critical Workforce Needs Dedicated, Portable, and Secure Connectivity
sponsored by CradlePoint
WEBCAST: One of the best ways to replicate an office network at home is by deploying a "wireless private network" or WPN – a completely separate and corporate-controlled network at home using LTE-based wireless. By doing so, IT can control the connectivity, reliability and security of the network. Watch this webcast to learn more.
Posted: 10 Nov 2020 | Premiered: Nov 10, 2020

CradlePoint

Explore COVID-19 Emergency Network Response Hub
sponsored by CradlePoint
WEBCAST: Pop-up healthcare has never been utilized more than it currently is. With the constant development and emergence of new healthcare technologies, these pop-up services require robust, stable and secure networks to give patients the care they need. Learn more by viewing this webcast on using LTE for pop-up care during COVID-19.
Posted: 09 Nov 2020 | Premiered: Apr 16, 2020

CradlePoint

Telemedicine Offer the Flexibility Healthcare Requires in COVID-19 Recovery
sponsored by CradlePoint
WEBCAST: Telemedicine has been embraced as a necessary means to sustain the health system during the pandemic, allowing patients and doctors to remain at home if needed. Reliable, fast and compliant networking is the key to providing these services. View this webinar to learn more.
Posted: 06 Nov 2020 | Premiered: Jul 9, 2020

CradlePoint

CBRS – New Mobile Technology for Mission Needs
sponsored by CommScope
DATA SHEET: Citizens Broadband Radio Spectrum (CBRS) is a monumental change in spectrum allocation that came after the DoD agreed to share 150 MHz of wireless spectrum in the 3.5 GHz cellular band that had been used primarily for Navy radar and sonar with public and private entities. Read this data sheet to see one wireless vendor’s CBRS developments.
Posted: 29 Oct 2020 | Published: 31 Jul 2020

CommScope

Raising Cane’s IT Team has Remote Visibility & Control of Connectivity at Branch Eateries
sponsored by CradlePoint
CASE STUDY: A fast-growing quick service restaurant was looking to upgrade its network connectivity, establish PCI compliance and explore on-site wireless capabilities, including LTE-based failover. It also wanted to manage all of its devices on a distributed network from one central location. Take a look at this case study to see how CradlePoint helped.
Posted: 29 Oct 2020 | Published: 29 Oct 2020

CradlePoint

Cradlepoint Solution Allows Retail Jewelry Store to Open on Time, Saving $50,000
sponsored by CradlePoint
CASE STUDY: Pandora, an international jewelry retailer, was almost delayed opening one of its unique concept stores in Lancaster, PA because of an ISP strike. However, its outsourced IT expert packaged a technology solution that allowed the store to open on time. Read the full case study to learn the details and how the jeweler avoided a $50,000 loss.
Posted: 28 Oct 2020 | Published: 28 Oct 2020

CradlePoint

CradlePoint Wireless Networks Study — Australia 2020
sponsored by CradlePoint
ANALYST REPORT: Connectivity is essential for business. While that’s nothing new, the brushfires and implications of COVID-19 in Australia have put the spotlight firmly on the need for more and better connectivity options. In this Cradlepoint Wireless Networks Study, learn how IT decision makers in medium to large organizations plan to use 5G to their advantage.
Posted: 23 Oct 2020 | Published: 23 Oct 2020

CradlePoint

Sacramento Regional Transit District Used Connected Buses to Serve Communities During Pandemic
sponsored by CradlePoint
VIDEO: The Sacramento Regional Transit District (SacRT) was looking to find additional ways to support the community during an extended period of low ridership. What they did was equip buses with wireless edge solutions to create “super hotspots” in areas where many people didn’t have internet access. Read this short brief to learn the details.
Posted: 21 Oct 2020 | Premiered: 09 Oct 2020

CradlePoint

Assuring the Promise of a Secure 5G Future: 5 Steps to Taming the Complexity and Exploiting 5G Opportunities
sponsored by Spirent
WHITE PAPER: 5G will radically improve mobile broadband services, enable connectivity to billions of global devices and create an IoT boom. So what’s holding up 5G deployment in real-world use cases? The answer is security – particularly in that 5G networks need to be tested and validated. Read this white paper to learn 5 steps to 5G security.
Posted: 16 Oct 2020 | Published: 31 Jul 2019

Spirent

Top Mobile Security Threats and How to Protect Your Business
sponsored by Verizon
RESOURCE: Mobile devices can be vital to keeping employees connected with coworkers and customers. But how do you protect them against the threat of cybercriminals? In this brief, learn about the top five mobile security threats and how to safeguard your devices and business against them.
Posted: 08 Oct 2020 | Published: 08 Oct 2020

Verizon

Teach & Learn From Anywhere
sponsored by CradlePoint
WEBCAST: A recent survey showed that only 8% of Americans believe that schools can return to normal. This may be a good thing, - 78% of people worldwide believe that online learning will expand access to education globally. The result will be all-time high internet access demand. Watch this webcast to learn how wireless WAN can optimize learning-from-home.
Posted: 04 Sep 2020 | Premiered: Sep 4, 2020

CradlePoint

Protect Your Network Before Attacks Evolve
sponsored by Claranet
WEBCAST: Your most sensitive data lives on the endpoint and in the cloud. Fast reactions prevent potential breaches and require a combination of technology and resource. Watch this webinar on endpoint detection and response (EDR) demonstrating how you can fortify the edge with real-time monitoring and detection of malicious events on endpoints.
Posted: 24 Aug 2020 | Premiered: Aug 7, 2020

Claranet

Cradlepoint NetCloud Work From Anywhere Solution vs. Consumer Grade Hotspots
sponsored by CradlePoint
DATA SHEET: Is your organization looking for a way to easily manage all of your devices at scale through the cloud, from anywhere? Is it important that you deploy consistent security policies to all of your routers? View this data sheet for an in-depth look at a solution that includes wireless routers with enterprise-class reliability, security and management.
Posted: 24 Aug 2020 | Published: 24 Aug 2020

CradlePoint

Reliable Access to the Internet is Key to Distance Learning
sponsored by CradlePoint
DATA SHEET: An adaptable network must be in place in order for students to continue learning. New approaches to networking are required. Students must be able to reliably access the internet, and teachers must be able to access cloud applications – and it must all be secure. Read this white paper to learn the importance of LTE connectivity during this time.
Posted: 21 Aug 2020 | Published: 21 Aug 2020

CradlePoint

Covid-19 & the New Normal for E-commerce
sponsored by Tala Security
WHITE PAPER: While online shopping has increased dramatically since the beginning of the pandemic, so too have threats targeting shoppers and other users. In fact, Magecart attacks have increased by 20%. Read on to explore how COVID-19 is shifting the e-commerce landscape and discover the long-term implications of these changes.
Posted: 20 Aug 2020 | Published: 20 Aug 2020

Tala Security

Secure, Cloud-Controlled Network to Enable Work From Home
sponsored by CradlePoint
WHITE PAPER: When organizations plan for employees to work remote, they must consider both security and bandwidth, and uncover ways for these two to be compromised or effortlessly seamed together. Which route does your department choose to go? Do you have plans for edge computing? Browse this solution brief to learn more about modernizing your network.
Posted: 10 Aug 2020 | Published: 10 Aug 2020

CradlePoint

Cyberattacks on Mobile Devices are on the Rise
sponsored by Verizon
WHITE PAPER: 5G networks promise increased security, but as it stands now, many organizations need to implement their own mobile security measures. Greater functionality means greater vulnerability, and your network must be ready. This article describes the new threat landscape that arrives with 5G and tells you how your organization can prepare.
Posted: 13 Jul 2020 | Published: 13 Jul 2020

Verizon

Spear Phishing: Top Threats and Trends
sponsored by Barracuda
WHITE PAPER: Business email compromise (BEC) is an emerging cybersecurity threat that targets user inboxes. While BEC makes up just 7% of spear-phishing attacks, it’s responsible for over $26 billion in losses in the last four years. In this report, explore the latest BEC tactics used by scammers and best practices for protecting your organization.
Posted: 18 May 2020 | Published: 30 Nov 2019

Barracuda

What Is Endpoint Detection and Response (EDR)?
sponsored by VMware International Unlimited Company
RESOURCE: As cyberattackers find more creative and elaborate ways of bypassing security measures and infect endpoint, the reactionary nature of traditional security tools is becoming increasingly ineffective. So, what can organizations do to proactively ensure the security of their critical endpoints? Read this article to find out.
Posted: 13 May 2020 | Published: 13 May 2020

VMware International Unlimited Company

13 Email Threat Types to Know about Right Now
sponsored by Barracuda
RESOURCE: As email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.
Posted: 07 May 2020 | Published: 01 May 2020

Barracuda

The Malicious Bot Playbook: Early Warning Signs, and What to Do About Them
sponsored by Cloudflare
WHITE PAPER: Similar to social engineering attacks, bot attacks are highly targeted to expose the vulnerabilities of a specific organization. Understanding the telltale bot warning signs has proven to be an effective measure at predicting and preventing attacks. This playbook outlines the common warning signs and tactics for addressing them.
Posted: 01 May 2020 | Published: 01 May 2020

Cloudflare

Replace AV Buyer’s Guide
sponsored by VMware International Unlimited Company
WHITE PAPER: When it comes to protecting your endpoints against cyberattacks, choosing the right solution that is easy to deploy, easy to manage and can cost-effectively protect your growing business is critical. This buyer’s guide is designed to ease the process by providing you with the knowledge you need to make your selection.
Posted: 30 Apr 2020 | Published: 30 Apr 2020

VMware International Unlimited Company
1 - 25 of 238 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info