IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Wireless Security

RSS Feed   
ALSO CALLED: mSecurity, Wireless LAN Security, Wi-Fi Security, Wireless Network Security, WLAN Security, Mobile Security
DEFINITION: Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection. Bluetooth is a high-speed but very short-range wireless technology for exchanging data between desktop and mobile computers, personal digital assistants (PDAs), and other devices. By exploiting a vulnerability in the way Bluetooth is implemented on a mobile phone, an attacker can access information -- such  … 

Wireless Security definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary
Wireless Security Reports
26 - 50 of 207 Matches Previous Page  |  Next Page
The Evolution of Mobile Security
sponsored by Symantec
WHITE PAPER: Given that emails containing sensitive information are routinely opened on a mobile device, implementing robust security controls on these devices should be a top priority. In this white paper, learn how to break down the barriers that separate mobile security from traditional security to ensure your organization has a seamless security ecosystem.
Posted: 08 May 2019 | Published: 08 May 2019

Symantec

Avoid Cyberattacks and Save Money by Holding Less Data
sponsored by Evident
WHITE PAPER: Now more than ever before, data is at the heart of every organization. However, cybercriminals have increasingly targeted data because it's both monetarily lucrative and easier to steal than actual dollars. In this white paper, learn how your company can protect itself from a breach, and how data minimization can reduce the risks of cyberattacks.
Posted: 29 Apr 2019 | Published: 29 Apr 2019

Evident

Building the Business Case for Strong Authentication
sponsored by HID Global
WHITE PAPER: To ensure customers are able to conduct financial transactions whenever they need, financial institutions have increased the access they provide to critical internal banking applications. In this white paper, learn how companies can safely deliver mobile banking services by providing multi-factor authentication security.
Posted: 10 Apr 2019 | Published: 07 Oct 2016

HID Global

RingCentral Case Study
sponsored by Data Theorem
CASE STUDY: RingCentral did not have the experts or a scalable platform to provide security coverage for their mobile apps. However, they have a requirement with their customers and partners to perform third-party security testing for all of their apps. In this case study, learn how RingCentral was able to address this issue using Data Theorem's App Secure.
Posted: 09 Apr 2019 | Published: 09 Apr 2019

Data Theorem

Carnival Navigates Sea of Data With Splunk
sponsored by Splunk
CASE STUDY: In this case study, learn how Carnival Corporation deployed the Splunk platform to increase visibility across all systems, secure shipboard systems and protect customer data. Since deploying Splunk, Carnival has seen many benefits.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Splunk

What Attacks Aren't You Seeing?
sponsored by Cisco Umbrella
RESOURCE: We work everywhere, yet traditional network security solutions still focus on protecting employees while on the corporate network. In this resource, learn about the risks of only relying on legacy defenses. Also, discover how Cisco Umbrella can help your organization by providing visibility into all internet requests across your network.
Posted: 19 Feb 2019 | Published: 19 Feb 2019

Cisco Umbrella

Market Guide for Application Shielding
sponsored by Arxan
RESEARCH CONTENT: Protecting applications that run within untrusted environments is crucial as mobile, IoT and modern web applications migrate software logic to the client side. Application shielding is well-suited to protect consumer mobile apps. Download this Gartner research report to learn more about application shielding.
Posted: 14 Feb 2019 | Published: 27 Jun 2018

Arxan

A New Security Strategy that Protects the Organization When Work Is Happening from Anywhere
sponsored by Citrix
RESOURCE: The concept of the "digital perimeter" has changed dramatically. Protecting the perimeter by building a wall too keep the bad guys out is no longer appropriate because of mobility, the cloud and constant remote access to internal systems. In this resource, learn how to better secure your organization against increasingly sophisticated attacks.
Posted: 07 Feb 2019 | Published: 07 Feb 2019

Citrix

Best Practices for Protecting Against Phishing, Ransomware and Email Fraud
sponsored by DomainTools
WHITE PAPER: Security teams and the organizations they support live in difficult times: they increasingly are the targets of sophisticated threats. In this white paper, learn about the top concerns of decision makers, the growing success of cyberthreats, security's need to improve and best practices to consider.
Posted: 10 Jan 2019 | Published: 30 Apr 2018

DomainTools

IT Security Gap: Ponemon Survey Solution
sponsored by Aruba Networks
RESOURCE: The IT security gap's size and complexity is growing rapidly. With an increasingly mobile user experience, cloud solutions and IoT access to IT networks, building a cyber-defense is more challenging. In this resource, learn about a survey run by Ponemon Institute and Aruba which explores what makes the IT security gap so difficult to close.
Posted: 18 Dec 2018 | Published: 10 Sep 2018

Aruba Networks

Modern Management of Windows Devices with VMware Workspace One
sponsored by VMware
WHITE PAPER: Discover ways your organization can let its employees work with a wide range of devices, on site or remote, while maintaining security and compliance through a unified management platform.
Posted: 17 Aug 2018 | Published: 17 Aug 2018

VMware

3 Secrets to Becoming a Mobile Security Superhero
sponsored by Symantec
WHITE PAPER: Organizations are advised develop a consensus about adopting modern, advanced security technologies to protect mobile devices. Download to reveal 3 secrets that'll help you convince business leaders to buy-into mobile cybersecurity.
Posted: 08 Aug 2018 | Published: 31 Dec 2017

Symantec

Mobile Payments Using Host Card Emulation with NFC
sponsored by ComputerWeekly.com
RESEARCH CONTENT: In this article from our Royal Holloway security series, we present a set of risks associated with using smartphones for contactless payment transactions.
Posted: 11 May 2018 | Published: 11 May 2018

ComputerWeekly.com

Potential ROI and Benefits of ServiceNow Security Operations
sponsored by ServiceNow
RESEARCH CONTENT: This report provides a framework for evaluating the potential financial impact of investing in ServiceNow Security Operations to improve security incident and vulnerability response processes.
Posted: 18 Jan 2018 | Published: 31 Jan 2018

ServiceNow

Building Management Systems: The cyber security blind spot
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The systems which control heating, lighting and security in most buildings are vulnerable to cyber attack, this report from QinetiQ warns.
Posted: 26 Jan 2016 | Published: 26 Jan 2016

ComputerWeekly.com

Malware Hitching a Ride on Mobile Apps?
sponsored by SearchSecurity.com
EBOOK: The latest mobile app security threats ride into enterprises on employee devices, but you can learn the latest strategies for improving corporate BYOD security.
Posted: 27 Jun 2016 | Published: 20 Jun 2016

SearchSecurity.com

Mastering the Top Enterprise Mobility Challenges
sponsored by Microsoft
EGUIDE: Mobility is bringing new concerns that didn't exist with desktops. Protecting company data while staying compliant is a new challenge for IT admins. This e-guide explores how to handle the top five issues in today's mobile world.
Posted: 14 Jun 2016 | Published: 08 Jun 2016

Microsoft

It's time to tackle IoT security
sponsored by Ruckus Wireless
EGUIDE: The forecasts for IoT are huge. Some suggest that there will be 50 billion devices connected by 2020. Whether or not that prediction is accurate, it's clear that IoT is gaining meaningful market momentum, buoyed by an endless array of applications. Unfortunately, they are creating a multitude of security vulnerabilities and attack surfaces.
Posted: 09 Mar 2016 | Published: 07 Mar 2016

Ruckus Wireless

Securing Your Network in the Wireless Age
sponsored by Aruba Networks
EGUIDE: In this e-guide, you will learn how enterprise WLAN is growing in size and importance, driving up the need for more secure wireless network. Find out how vulnerable your wireless network could be and what happens when WLAN security is ignored.
Posted: 01 Mar 2016 | Published: 24 Feb 2016

Aruba Networks

Secure Your Internal Corporate Networks With ABAC
sponsored by Cryptzone
EGUIDE: In this e-guide, discover how ABAC can provide your network with a robust security method that addresses security issues caused by growing remote access and BYOD trends. You will also learn how continuous network security monitoring can allow your enterprise to detect and prevent future cyber-attacks from occurring.
Posted: 27 Jan 2016 | Published: 25 Jan 2016

Cryptzone

Protecting Data on the Go
sponsored by SearchSecurity.com
EBOOK: This guide informs InfoSec pros on the risks to business data carried on or accessed by employees' mobile devices and the best available protections for this business data on the go.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

SearchSecurity.com

Information Security Magazine: August Issue
sponsored by SearchSecurity.com
EZINE: Identity and access management is so complex that many companies have faltered when it comes to securing third-party vendors. With breaches on the rise, vulnerabilities can be costly.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

SearchSecurity.com

The Transformation of Wireless Network Security
sponsored by SearchSecurity.com
EBOOK: This expert guide outlines what you need to know in order to integrate Wi-Fi security into your overarching network security strategy. Read on to learn about how to effectively maintain robust security in the age of wireless connectivity.
Posted: 10 Dec 2014 | Published: 10 Dec 2014

SearchSecurity.com

Why Corporate Data Security Requires a Major Policy Shift in the Age of BYOD
sponsored by SearchSecurity.com
WHITE PAPER: Transitioning from Mobile Device Management (MDM) to Enterprise Mobile Management (EMM) can be daunting. Explore the key differences between EMM and MDM, how EMM features support security objectives, strategies to align EMM and MIS departments, and more.
Posted: 15 Oct 2014 | Published: 15 Oct 2014

SearchSecurity.com

Network Protection and UTM Buyer's Guide
sponsored by Sophos
WHITE PAPER: This white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
Posted: 03 Jul 2014 | Published: 31 Dec 2013

Sophos
26 - 50 of 207 Matches Previous Page    1 2 3 4 5    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement