IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Wireless Security

RSS Feed   
ALSO CALLED: mSecurity, Wireless LAN Security, Wi-Fi Security, Wireless Network Security, WLAN Security, Mobile Security
DEFINITION: Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection. Bluetooth is a high-speed but very short-range wireless technology for exchanging data between desktop and mobile computers, personal digital assistants (PDAs), and other devices. By exploiting a vulnerability in the way Bluetooth is implemented on a mobile phone, an attacker can access information -- such  … 

Wireless Security definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary
Wireless Security Reports
1 - 25 of 214 Matches Previous Page  |  Next Page
Magecart Attack on Focus Camera
sponsored by Tala Security
WHITE PAPER: Magecart attacks continue to plague websites and sensitive customer data. In this solution brief, learn how Tala Security protects against client-side attacks by exploring the features and capabilities the enable them to provide website security.
Posted: 24 Jan 2020 | Published: 24 Jan 2020

Tala Security

Spear-phishing Analysis with ThreatQ Investigations
sponsored by ThreatQuotient
WEBCAST: Spear-phishing attacks are a growing security threat to organizations and their employees. These attacks target victims from a seemingly reliable source to lure them to a malware-ridden site. This webinar provides an analysis of how to develop your spear-phishing investigation skills to spot an and attack before it becomes troublesome.
Posted: 23 Jan 2020 | Premiered: Jan 23, 2020

ThreatQuotient

Lattes, Lunch, and VPNs: Securing Remote Workers the Right Way
sponsored by Malwarebytes
WHITE PAPER: In this short story, following the journey of Olivia and Luciana as they face the cybersecurity threats associated with remote workers, VPNs and cloud platforms to establish the necessary technologies and employee enablement to overcome these challenges and reshape their security strategy.
Posted: 23 Jan 2020 | Published: 23 Jan 2020

Malwarebytes

Board Ready Endpoint Resilience in 5 Steps
sponsored by Malwarebytes
EBOOK: The increasing popularity in mobile workspaces and BYOD devices has transformed the way CISOs have to think about security. With cyberattacks on the rise, implementing endpoint resilience is has become critical. In this e-book, uncover the 5 essential steps to establishing endpoint security and the recommendations for achieving each step.
Posted: 23 Jan 2020 | Published: 23 Jan 2020

Malwarebytes

Mobile Verify
sponsored by Mitek Systems, Inc.
DATA SHEET: Through advanced machine-learning algorithms, identity verification enables businesses to authenticate their digital users’, empowering them to enhance customer experience and data security. Read this data sheet to explore the science behind Mitek’s Mobile Verify digital identity verification tool and how it works.
Posted: 22 Jan 2020 | Published: 22 Jan 2020


The 5 Most Dangerous New Attack Techniques: Are They Evolving?
sponsored by RSA Conference
WEBCAST: Each year at RSAC, SANS Institute reveals the most dangerous new attack techniques. On the list for 2019 were smartphone attacks, DNS manipulation, domain fronting, cloud-on-cloud attacks, CPU flaws and more. Watch this RSAC webcast to see the full—and accurate—list, plus the best methods to defeat these attacks.
Posted: 22 Jan 2020 | Premiered: Nov 19, 2019

RSA Conference

Malwarebytes Endpoint Protection & Response (EDR)
sponsored by Malwarebytes
DATA SHEET: According to a study, close to 60% of endpoints harbor hidden threats. These threats can disrupt productivity and cause financial and legal damage. In this solution brief, explore Malwarebytes’ Endpoint Protection and Response (EDR) platform and uncover its key features and benefits.
Posted: 22 Jan 2020 | Published: 22 Jan 2020

Malwarebytes

Cybercrime Tactics and Techniques: Ransomware Retrospective
sponsored by Malwarebytes
WHITE PAPER: In this edition of Cybercrime Tactics and Techniques, take an in-depth look into ransomware attacks over the past few years – attack methods, common targets and notable subcategories. In addition, this report will consider where ransomware will go next, and how to prepare. Read on to reveal the full report.
Posted: 21 Jan 2020 | Published: 31 Aug 2019

Malwarebytes

Building supply company boosts endpoint security with Malwarebytes
sponsored by Malwarebytes
CASE STUDY: In this case study, a large US building supply company implemented Malwarebytes’ Endpoint Protection and Response services to establish endpoint resiliency and reduce their remediation time from several days down to minutes or hours.
Posted: 21 Jan 2020 | Published: 21 Jan 2020

Malwarebytes

Interview with Fraud Strategy Leader
sponsored by Mitek Systems, Inc.
WHITE PAPER: In this Q and A, the fraud strategy leader at a mobile-only banking app sits down with the customer success leader at Mitek to talk about why customer experience is critical to business success and the vital role it plays in identity verification.
Posted: 21 Jan 2020 | Published: 21 Jan 2020


A Modern Approach to Endpoint Remediation
sponsored by Malwarebytes
DATA SHEET: According to incident response teams, 68% of cases they investigate are caused by malware. The costs and manpower required to remediate these issues is rising, and organizations need a modern approach to protecting their endpoints. In this solution brief, dive deeper into Malwarebytes’ modern approach to endpoint protection and response.
Posted: 20 Jan 2020 | Published: 20 Jan 2020

Malwarebytes

Onboarding IT Service Providers Shouldn’t be Complicated, Costly, or Risky
sponsored by Tehama
WHITE PAPER: Enterprises need to secure, accelerate, and simplify how they onboard external third parties and provide access to critical and vulnerable systems while mitigating the cybersecurity risks. This white paper goes in-depth into the associated risks and outlines potential tactics for ensuring security during the onboarding process.
Posted: 20 Jan 2020 | Published: 31 Jan 2019

Tehama

What is Tehama?
sponsored by Tehama
VIDEO: Today’s organizations need speed, security and access in order to stay competitive. In one SaaS platform, Tehama consolidates all capabilities and tools necessary to ensure secure access, continuous auditing and compliance enforcement. Continue to learn more about Tehama.
Posted: 20 Jan 2020 | Premiered: 20 Jan 2020

Tehama

Pervasive Protection: Enabling Secure Work from Anywhere
sponsored by Malwarebytes
RESOURCE: The digitally transformed workplace consists of employees that expect to get their work done anywhere. This mix of onsite and remote workers, as well as the explosion of devices and applications they now use, presents a security challenge. In this infographic, find out what security managers need to know to defend against today’s cyberattacks.
Posted: 20 Jan 2020 | Published: 20 Jan 2020

Malwarebytes

Buyer’s Guide Digital Identity Verification
sponsored by Mitek Systems, Inc.
WHITE PAPER: Much of today’s customer interaction is done via digital interactions. As this trend continues to grow, organizations need to ensure that they balance customer experience with security. This buyer’s guide provides an overview of current identity verification tools as well as an evaluation workbook to steer you towards an informed decision.
Posted: 20 Jan 2020 | Published: 31 May 2019


Comprehensive Lifecycle Management
sponsored by Insight
WEBCAST: The expectations of today’s workforce combined with the advancements in technology, means there are more mobile devices than ever before. While this is good for productivity, it creates its own set of security challenges. In this webcast, learn how to better protect your organization with Microsoft’s EM+S Solution and Insight.
Posted: 20 Jan 2020 | Premiered: Jan 20, 2020

Insight

Endpoint Protection
sponsored by Malwarebytes
WHITE PAPER: Networks are expanding to include remote devices that exist outside of the traditional perimeter, and organizations require modern endpoint security services. In this white paper, uncover the results from Info-Tech’s Data Quadrant Report on endpoint security to ensure your organization is equipped to make an informed buying decision.
Posted: 17 Jan 2020 | Published: 30 Jun 2019

Malwarebytes

Protect your users and devices with Cisco Umbrella and Cisco AMP for Endpoints
sponsored by Cisco Umbrella
DATA SHEET: An estimated 70% of breaches start on endpoints – laptops, workstations, servers and mobile devices. Why are attackers targeting endpoints, and how can an organization better defend itself? Read this solution brief to discover how combining Cisco Umbrella and Cisco AMP can allow you establish effective endpoint protection.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

Cisco Umbrella

Cisco Umbrella and Meraki MR – Effective protection for corporate and guest Wi-Fi
sponsored by Cisco Umbrella
DATA SHEET: In this solution brief, take a closer look at the integration of Cisco Umbrella and Meraki MR for simple and effective protection for corporate and guest Wi-Fi. Discover how it works and why you should consider deploying this integration.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

Cisco Umbrella

ZS Solves Office 365 Security Issue with PortSys TAC
sponsored by PortSys
CASE STUDY: The threat of a data breach can damage an organization’s reputation with both customers and vendors. When ZS made the decision to implement Office 365, they needed enhanced security to cover data encryption and endpoint management. Read this case study to follow ZS’s journey towards a holistic data loss prevention strategy.
Posted: 06 Jan 2020 | Published: 06 Jan 2020

PortSys

Endpoint Security Suites, Q3 2019
sponsored by Checkpoint Software Technologies
ANALYST REPORT: Endpoint security suites are now more than ever being tasked with protecting against targeted-style threats. This Forrester Wave report shows how 15 endpoint security suite providers measure up and helps security and risk professionals select the right one for their needs.
Posted: 23 Dec 2019 | Published: 23 Sep 2019

Checkpoint Software Technologies

Key Protection with Intertrust whiteCriterion Secure Key Box
sponsored by Intertrust
WHITE PAPER: Traditional perimeter security strategies are insufficient for protecting the growing number of remote devices being used to conduct business. This white paper overviews cryptographic key security, a threat that is becoming increasingly relevant in today’s digital environment, and highlights the common techniques used by hackers.
Posted: 16 Dec 2019 | Published: 31 Aug 2018

Intertrust

Taking Steps to Protect Financial Mobile Applications
sponsored by Intertrust
WHITE PAPER: Although the popularity of mobile applications has greatly simplified the use of day-to-day financial operations for the end user, it has created additional workload for ensuring their security. In this white paper, take an in-depth look into the world of financial mobile applications and learn practical ways to ensure protection.
Posted: 13 Dec 2019 | Published: 13 Dec 2019

Intertrust

Respond to the Changing Mobility Landscape
sponsored by Smarsh
WHITE PAPER: As employees rapidly adopt mobile devices for work communications, a challenge was created for organizations needing to capture and review all business communications for regulatory or public records response purposes. In this white paper, learn how organizations can build a strong, compliant mobility ecosystem.
Posted: 26 Nov 2019 | Published: 26 Nov 2019

Smarsh

Considering Wi-Fi 6
sponsored by Extreme Networks
WHITE PAPER: As enterprises evaluate Wi-Fi 6, it’s important to understand which components are useful and which are hype. In this white paper, discover everything about Wi-Fi 6 which includes Wi-Fi 6 buying tips, Wi-Fi usage and challenges across industries and more.
Posted: 25 Nov 2019 | Published: 25 Nov 2019

Extreme Networks
1 - 25 of 214 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info