IT Management  >   Systems Operations  >   Security  >   Network Security  >  

Wireless Security

RSS Feed   
ALSO CALLED: mSecurity, Wireless LAN Security, Wi-Fi Security, Wireless Network Security, WLAN Security, Mobile Security
DEFINITION: Bluesnarfing is the theft of information from a wireless device through a Bluetooth connection. Bluetooth is a high-speed but very short-range wireless technology for exchanging data between desktop and mobile computers, personal digital assistants (PDAs), and other devices. By exploiting a vulnerability in the way Bluetooth is implemented on a mobile phone, an attacker can access information -- such  … 

Wireless Security definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary
Wireless Security Reports
51 - 75 of 235 Matches Previous Page  |  Next Page
Protect your users and devices with Cisco Umbrella and Cisco AMP for Endpoints
sponsored by Cisco Umbrella
DATA SHEET: An estimated 70% of breaches start on endpoints – laptops, workstations, servers and mobile devices. Why are attackers targeting endpoints, and how can an organization better defend itself? Read this solution brief to discover how combining Cisco Umbrella and Cisco AMP can allow you establish effective endpoint protection.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

Cisco Umbrella

Cisco Umbrella and Meraki MR – Effective protection for corporate and guest Wi-Fi
sponsored by Cisco Umbrella
DATA SHEET: In this solution brief, take a closer look at the integration of Cisco Umbrella and Meraki MR for simple and effective protection for corporate and guest Wi-Fi. Discover how it works and why you should consider deploying this integration.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

Cisco Umbrella

ZS Solves Office 365 Security Issue with PortSys TAC
sponsored by PortSys
CASE STUDY: The threat of a data breach can damage an organization’s reputation with both customers and vendors. When ZS made the decision to implement Office 365, they needed enhanced security to cover data encryption and endpoint management. Read this case study to follow ZS’s journey towards a holistic data loss prevention strategy.
Posted: 06 Jan 2020 | Published: 06 Jan 2020

PortSys

Endpoint Security Suites, Q3 2019
sponsored by Checkpoint Software Technologies
ANALYST REPORT: Endpoint security suites are now more than ever being tasked with protecting against targeted-style threats. This Forrester Wave report shows how 15 endpoint security suite providers measure up and helps security and risk professionals select the right one for their needs.
Posted: 23 Dec 2019 | Published: 23 Sep 2019

Checkpoint Software Technologies

Respond to the Changing Mobility Landscape
sponsored by Smarsh
WHITE PAPER: As employees rapidly adopt mobile devices for work communications, a challenge was created for organizations needing to capture and review all business communications for regulatory or public records response purposes. In this white paper, learn how organizations can build a strong, compliant mobility ecosystem.
Posted: 26 Nov 2019 | Published: 26 Nov 2019

Smarsh

Oklahoma Municipal Power Authority Energizes Team's Secure Remote Access with TAC
sponsored by PortSys
CASE STUDY: Technology inventions are being integrated across the energy sector with legacy hardware and software systems. However, the patches on these legacy systems can't keep up with today's threats. In this case study, learn how these challenges led to Oklahoma Municipal Power Authority deploying Total Access Control to help provide secure remote access.
Posted: 12 Sep 2019 | Published: 12 Sep 2019

PortSys

Protection Inside and Outside the Office: The New State of Cybersecurity
sponsored by Cisco Umbrella
RESOURCE: Download this infographic to explore key findings from the Enterprise Strategy Group's survey of 450 cybersecurity experts on their experience protecting a network without perimeters.
Posted: 05 Sep 2019 | Published: 05 Sep 2019

Cisco Umbrella

Courier Prevents Shipping Fraud
sponsored by Shape Security
CASE STUDY: A top 5 global courier wanted to protect its customers from account takeover and prevent fraudulent account creation. In this case study, learn how the provider was able to do this by deploying Shape Enterprise Defense across its login and account creation applications on both the web and mobile devices.
Posted: 26 Aug 2019 | Published: 26 Aug 2019

Shape Security

Top 10 North American Bank Eliminates Credential Stuffing
sponsored by Shape Security
CASE STUDY: A Big 5 Canadian bank had been suffering from automated attacks on its web and mobile login applications for months. Bad actors were performing credential stuffing attacks on all possible channels. In this case study, learn how Shape's Enterprise Defense service and Threat Intelligence team were able to successfully defend against these attacks.
Posted: 20 Aug 2019 | Published: 20 Aug 2019

Shape Security

Airline Stops Automated Attacks on Web & Mobile
sponsored by Shape Security
CASE STUDY: A top 10 global airline was facing 2 major types of attacks including credential stuffing and fare scraping. When account lockouts peaked due to these attacks, the airline knew it needed to find a solution to stop credential stuffing attacks immediately. In this case study, learn why they decided to deploy Shape Enterprise Defense.
Posted: 20 Aug 2019 | Published: 20 Aug 2019

Shape Security

Online Retail Threats Credential Stuffing
sponsored by Shape Security
WHITE PAPER: In the past decade, the frequency of credential theft has increased and the tools and techniques used by cybercriminals have evolved. In this white paper, explore one of the most common threats to retailers – credential stuffing – and learn how Shape works with major retailers to shut these attacks down.
Posted: 16 Aug 2019 | Published: 16 Aug 2019

Shape Security

Carnival Navigates Sea of Data With Splunk
sponsored by Splunk
WHITE PAPER: In this case study, learn how Carnival Corporation deployed the Splunk platform to increase visibility across all systems, secure shipboard systems and protect customer data. Since deploying Splunk, Carnival has seen many benefits.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Splunk

Employee Habits that Can Put Your Company at Risk
sponsored by Panda Security
WHITE PAPER: While maintaining secure devices and networks is critical to an organization's cybersecurity, it's not the only thing companies should focus on. When it comes to keeping an organization secure, employees are often the weakest link. Download this white paper to learn how employees are threatening your company and ways to prevent it.
Posted: 28 Jan 2019 | Published: 28 Jan 2019

Panda Security

Cryptojacking: A Hidden Cost
sponsored by Panda Security
WHITE PAPER: Cryptojacking is one of the newest threats to cybersecurity in the last two years. Easy to carry out and difficult to detect, these attacks involve cybercriminals taking control of a third-party device's CPU to mine valuable cryptocurrencies. Download this white paper to learn more about the threat and how to protect your devices.
Posted: 28 Jan 2019 | Published: 28 Jan 2019

Panda Security

IT Security Gap: Ponemon Survey Solution
sponsored by Aruba Networks
RESOURCE: The IT security gap's size and complexity is growing rapidly. With an increasingly mobile user experience, cloud solutions and IoT access to IT networks, building a cyber-defense is more challenging. In this resource, learn about a survey run by Ponemon Institute and Aruba which explores what makes the IT security gap so difficult to close.
Posted: 18 Dec 2018 | Published: 10 Sep 2018

Aruba Networks

Mobile Payments Using Host Card Emulation with NFC
sponsored by ComputerWeekly.com
RESEARCH CONTENT: In this article from our Royal Holloway security series, we present a set of risks associated with using smartphones for contactless payment transactions.
Posted: 11 May 2018 | Published: 11 May 2018

ComputerWeekly.com

Building Management Systems: The cyber security blind spot
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: The systems which control heating, lighting and security in most buildings are vulnerable to cyber attack, this report from QinetiQ warns.
Posted: 26 Jan 2016 | Published: 26 Jan 2016

ComputerWeekly.com

Why EDR Technologies are Essential for Endpoint Protection
sponsored by SearchSecurity.com
EBOOK: While an organization's most valuable and sensitive data and systems are usually well-protected on interior servers situated inside data centers and behind firewalls, it is on the network endpoints where external attacks begin. In this handbook, learn how to address endpoint security issues in your organization.
Posted: 20 Jun 2019 | Published: 20 Jun 2019

SearchSecurity.com

Malware Hitching a Ride on Mobile Apps?
sponsored by SearchSecurity.com
EBOOK: The latest mobile app security threats ride into enterprises on employee devices, but you can learn the latest strategies for improving corporate BYOD security.
Posted: 27 Jun 2016 | Published: 20 Jun 2016

SearchSecurity.com

Mastering the Top Enterprise Mobility Challenges
sponsored by Microsoft
EGUIDE: Mobility is bringing new concerns that didn't exist with desktops. Protecting company data while staying compliant is a new challenge for IT admins. This e-guide explores how to handle the top five issues in today's mobile world.
Posted: 14 Jun 2016 | Published: 08 Jun 2016

Microsoft

It's time to tackle IoT security
sponsored by Ruckus Wireless
EGUIDE: The forecasts for IoT are huge. Some suggest that there will be 50 billion devices connected by 2020. Whether or not that prediction is accurate, it's clear that IoT is gaining meaningful market momentum, buoyed by an endless array of applications. Unfortunately, they are creating a multitude of security vulnerabilities and attack surfaces.
Posted: 09 Mar 2016 | Published: 07 Mar 2016

Ruckus Wireless

Securing Your Network in the Wireless Age
sponsored by Aruba Networks
EGUIDE: In this e-guide, you will learn how enterprise WLAN is growing in size and importance, driving up the need for more secure wireless network. Find out how vulnerable your wireless network could be and what happens when WLAN security is ignored.
Posted: 01 Mar 2016 | Published: 24 Feb 2016

Aruba Networks

Secure Your Internal Corporate Networks With ABAC
sponsored by Cryptzone
EGUIDE: In this e-guide, discover how ABAC can provide your network with a robust security method that addresses security issues caused by growing remote access and BYOD trends. You will also learn how continuous network security monitoring can allow your enterprise to detect and prevent future cyber-attacks from occurring.
Posted: 27 Jan 2016 | Published: 25 Jan 2016

Cryptzone

Protecting Data on the Go
sponsored by SearchSecurity.com
EBOOK: This guide informs InfoSec pros on the risks to business data carried on or accessed by employees' mobile devices and the best available protections for this business data on the go.
Posted: 18 Aug 2015 | Published: 18 Aug 2015

SearchSecurity.com

Information Security Magazine: August Issue
sponsored by SearchSecurity.com
EZINE: Identity and access management is so complex that many companies have faltered when it comes to securing third-party vendors. With breaches on the rise, vulnerabilities can be costly.
Posted: 03 Aug 2015 | Published: 03 Aug 2015

SearchSecurity.com
51 - 75 of 235 Matches Previous Page    1 2 3 4 5 6    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info