IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Wireless Security

RSS Feed   
ALSO CALLED: mSecurity, Wireless LAN Security, Wi-Fi Security, Wireless Network Security, WLAN Security, Mobile Security
DEFINITION: Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection. Bluetooth is a high-speed but very short-range wireless technology for exchanging data between desktop and mobile computers, personal digital assistants (PDAs), and other devices. By exploiting a vulnerability in the way Bluetooth is implemented on a mobile phone, an attacker can access information -- such  … 

Wireless Security definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary
Wireless Security Reports
1 - 25 of 203 Matches Previous Page  |  Next Page
Enterprise Wi-Fi 6 Goes Mainstream
sponsored by CommScope
WHITE PAPER: As performance remains a top concern for Wi-Fi users, enterprises are adopting the latest version: Wi-Fi 6. By reading this white paper, you can explore the scale of Wi-Fi 6 adoption, its prospective effect on business productivity and how it could pave the way for technologies such as IoT.
Posted: 17 Nov 2020 | Published: 25 Jun 2020

CommScope

Webinar – Ruckus Wireless: Wi-Fi 6
sponsored by CommScope
WEBCAST: The next generation of wireless connectivity, Wi-Fi 6, is coming, and with it, a host of improvements in network performance. View this webinar to delve into the technology enhancements Wi-Fi 6 will deliver, who might benefit and real-world enterprise use cases. Network managers will learn what to do now to capitalize on the transition to Wi-Fi 6.
Posted: 16 Nov 2020 | Premiered: Nov 16, 2020

CommScope

Teach & Learn From Anywhere
sponsored by CradlePoint
WEBCAST: A recent survey showed that only 8% of Americans believe that schools can return to normal. This may be a good thing, - 78% of people worldwide believe that online learning will expand access to education globally. The result will be all-time high internet access demand. Watch this webcast to learn how wireless WAN can optimize learning-from-home.
Posted: 04 Sep 2020 | Premiered: Sep 4, 2020

CradlePoint

Cradlepoint NetCloud Work From Anywhere Solution vs. Consumer Grade Hotspots
sponsored by CradlePoint
DATA SHEET: Is your organization looking for a way to easily manage all of your devices at scale through the cloud, from anywhere? Is it important that you deploy consistent security policies to all of your routers? View this data sheet for an in-depth look at a solution that includes wireless routers with enterprise-class reliability, security and management.
Posted: 24 Aug 2020 | Published: 24 Aug 2020

CradlePoint

Reliable Access to the Internet is Key to Distance Learning
sponsored by CradlePoint
DATA SHEET: An adaptable network must be in place in order for students to continue learning. New approaches to networking are required. Students must be able to reliably access the internet, and teachers must be able to access cloud applications – and it must all be secure. Read this white paper to learn the importance of LTE connectivity during this time.
Posted: 21 Aug 2020 | Published: 21 Aug 2020

CradlePoint

Covid-19 & the New Normal for E-commerce
sponsored by Tala Security
WHITE PAPER: While online shopping has increased dramatically since the beginning of the pandemic, so too have threats targeting shoppers and other users. In fact, Magecart attacks have increased by 20%. Read on to explore how COVID-19 is shifting the e-commerce landscape and discover the long-term implications of these changes.
Posted: 20 Aug 2020 | Published: 20 Aug 2020

Tala Security

Secure, Cloud-Controlled Network to Enable Work From Home
sponsored by CradlePoint
WHITE PAPER: When organizations plan for employees to work remote, they must consider both security and bandwidth, and uncover ways for these two to be compromised or effortlessly seamed together. Which route does your department choose to go? Do you have plans for edge computing? Browse this solution brief to learn more about modernizing your network.
Posted: 10 Aug 2020 | Published: 10 Aug 2020

CradlePoint

Cyberattacks on Mobile Devices are on the Rise
sponsored by Verizon
WHITE PAPER: 5G networks promise increased security, but as it stands now, many organizations need to implement their own mobile security measures. Greater functionality means greater vulnerability, and your network must be ready. This article describes the new threat landscape that arrives with 5G and tells you how your organization can prepare.
Posted: 13 Jul 2020 | Published: 13 Jul 2020

Verizon

Spear Phishing: Top Threats and Trends
sponsored by Barracuda
WHITE PAPER: Business email compromise (BEC) is an emerging cybersecurity threat that targets user inboxes. While BEC makes up just 7% of spear-phishing attacks, it’s responsible for over $26 billion in losses in the last four years. In this report, explore the latest BEC tactics used by scammers and best practices for protecting your organization.
Posted: 18 May 2020 | Published: 30 Nov 2019

Barracuda

What Is Endpoint Detection and Response (EDR)?
sponsored by VMware International Unlimited Company
RESOURCE: As cyberattackers find more creative and elaborate ways of bypassing security measures and infect endpoint, the reactionary nature of traditional security tools is becoming increasingly ineffective. So, what can organizations do to proactively ensure the security of their critical endpoints? Read this article to find out.
Posted: 13 May 2020 | Published: 13 May 2020

VMware International Unlimited Company

13 Email Threat Types to Know about Right Now
sponsored by Barracuda
RESOURCE: As email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.
Posted: 07 May 2020 | Published: 01 May 2020

Barracuda

The Malicious Bot Playbook: Early Warning Signs, and What to Do About Them
sponsored by Cloudflare
WHITE PAPER: Similar to social engineering attacks, bot attacks are highly targeted to expose the vulnerabilities of a specific organization. Understanding the telltale bot warning signs has proven to be an effective measure at predicting and preventing attacks. This playbook outlines the common warning signs and tactics for addressing them.
Posted: 01 May 2020 | Published: 01 May 2020

Cloudflare

Replace AV Buyer’s Guide
sponsored by VMware International Unlimited Company
WHITE PAPER: When it comes to protecting your endpoints against cyberattacks, choosing the right solution that is easy to deploy, easy to manage and can cost-effectively protect your growing business is critical. This buyer’s guide is designed to ease the process by providing you with the knowledge you need to make your selection.
Posted: 30 Apr 2020 | Published: 30 Apr 2020

VMware International Unlimited Company

Barracuda Forensics and Incident Response
sponsored by Barracuda
VIDEO: When it comes to email-based threats, incident response is traditionally a manual process that costs time and money. In this short video, take a closer look at the key features of Barracuda Forensics and Incident Response, which is designed to replace outdated methods with an automated, data-driven approach.
Posted: 24 Apr 2020 | Premiered: 24 Apr 2020

Barracuda

Protecting Business and Remote Workers from COVID-19 Email Threats
sponsored by Barracuda
VIDEO: The recent shift to working remotely as a result of the spread of COVID-19 has made organizations more vulnerable to email-based cyberattacks. This webinar breaks down the various methods being used by hackers and offers best practices for protecting your business and workers.
Posted: 21 Apr 2020 | Premiered: 21 Apr 2020

Barracuda

MSPs Transform Their Endpoint Security
sponsored by Malwarebytes
CASE STUDY: In this collection of case studies, follow the journeys of three organizations (Optimus System, Sentrian, and Edge Computers) as they partner with Malwarebytes to navigate endpoint security challenges related to malware infections, downtime, ransomware, and more. Read on to get started.
Posted: 14 Apr 2020 | Published: 14 Apr 2020

Malwarebytes

Webinar: Managing the Cybersecurity Risk of Your Growing Remote Workforce
sponsored by Automox
WEBCAST: Due to recent events, the workforce has completely shifted, and organizations are forced to adopt remote work policies. In this webinar, join two Automox security experts as they offer insight into seamlessly transitioning your security posture (including endpoints and mobile devices) to reflect the changes in your workforce.
Posted: 09 Apr 2020 | Premiered: Apr 9, 2020


Your Path to a Mature AppSec Program
sponsored by Veracode, Inc.
WHITE PAPER: Although applications are critical to how businesses operate, web apps are among the top risk areas that hackers attempt to expose. In fact, nearly 40% of global data breaches originate at the application-layer. In this guide, discover what effective application security looks like and learn the steps you can take to reach app sec maturity.
Posted: 01 Apr 2020 | Published: 01 Apr 2020

Veracode, Inc.

Intelligent Cloud Identity Platform
sponsored by SailPoint Technologies
WHITE PAPER: Digital transformation enables organizations to improve their agility and growth, allowing for increased productivity. However, this change also bring increasingly distributed workforces, which exposes an organization to potential risk. So, what can IT security leaders do to meet this risk? Download this white paper to find out.
Posted: 17 Mar 2020 | Published: 17 Mar 2020

SailPoint Technologies

Machina Tools — SDKs
sponsored by Ionic Security
PRODUCT OVERVIEW: An issue plaguing today’s networks is the siloed approach to security and management, allowing hackers to exploit the gaps and enter your network. In this solution brief, take a closer look at Ionic’s Machina Tools, designed to close these gaps and unify your security strategy.
Posted: 05 Mar 2020 | Published: 05 Mar 2020

Ionic Security

Top 5 Use Cases for Cisco Umbrella
sponsored by Cisco Umbrella
RESOURCE: The modern workplace has evolved to include remote access and mobile devices, while also introducing a new generation of complex security threats. In this e-book, 5 customers share the unique ways Cisco Umbrella protects their network. Read on to unlock the use cases.
Posted: 04 Mar 2020 | Published: 04 Mar 2020

Cisco Umbrella

Secure Everywhere: The Power of Integrated Internet, Endpoint & Email Security
sponsored by Cisco Umbrella
RESOURCE: Organizations today are struggling to find the resources needed to identify and address security gaps within their networks. This e-book is designed to help get you started by highlighting the challenges that lead to security gaps and overviewing the benefits of an integrated approach to security. Read on to learn more.
Posted: 02 Mar 2020 | Published: 02 Mar 2020

Cisco Umbrella

Ultimate Guide to Bot Management
sponsored by Radware
EBOOK: Bots have completely revolutionized the way we interact digitally. In fact, bots account for more than half of all internet traffic. Unfortunately, some bots play a more sinister role – committing acts of fraud. In this e-book, explore the threats posed by malicious bots and discover tactics for detecting & mitigating these risks.
Posted: 26 Feb 2020 | Published: 26 Feb 2020

Radware

The Four Biggest Challenges to Keeping Modern Applications Secure
sponsored by Radware
WHITE PAPER: According to a recent study, just 33% of organizations feel their web application firewall (WAF) addresses all application-targeted threats. While implementing a WAF is an important starting point for ensuring the protection of modern apps, there are other key challenges and threats to consider. Download this report to learn more.
Posted: 24 Feb 2020 | Published: 24 Feb 2020

Radware

The Essential Guide to Secure Web Gateways
sponsored by AT&T Cybersecurity
RESOURCE: Organizations are continuing to incorporate cloud technologies and employ remote workers, but traditional security systems are struggling to protect these expanding networks. Although not a 1:1 replacement for firewalls, Secure Web Gateways (SWGs) may be able to help fill the gaps. Download this white paper to explore the nuances of SWGs.
Posted: 21 Feb 2020 | Published: 13 Jan 2020

AT&T Cybersecurity
1 - 25 of 203 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info