Wireless Security Research
-
The development of wired and wireless LANs in a hybrid work model
Sponsored by: TechTarget ComputerWeekly.comMany companies have found that as they have begun to manage the return to offices for the first time since the first lockdown were introduced, the office environment and its demands are very different to a year ago. These different demands are seen in the development of wired and wireless local area networks (LANs).
-
5g And The Journey To The Edge
Sponsored by: AT&T CybersecurityWith the many new ways to take advantage of low-latency, high-speed and reliability 5G is set to offer, how are organizations preparing cybersecurity practices, policies and procedures? The AT&T Cybersecurity Insights Report: 5G and the Journey to the Edge examines global cybersecurity data and the future of computing.
-
Spear Phishing vol3: Top Threats and Trends: Defending against business email compromise attacks
Sponsored by: BarracudaBusiness email compromise (BEC) is an emerging cybersecurity threat that targets user inboxes. While BEC makes up just 7% of spear-phishing attacks, it’s responsible for over $26 billion in losses in the last four years. In this report, explore the latest BEC tactics used by scammers and best practices for protecting your organization.
-
13 email threat types to know about right now
Sponsored by: BarracudaAs email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.
-
Protecting Business and Remote Workers from Covid-19 Email Threats
Sponsored by: BarracudaThe recent shift to working remotely as a result of the spread of COVID-19 has made organizations more vulnerable to email-based cyberattacks. This webinar breaks down the various methods being used by hackers and offers best practices for protecting your business and workers.
-
Mobile Payments Using Host Card Emulation with NFC
Sponsored by: TechTarget ComputerWeekly.comIn this article from our Royal Holloway security series, we present a set of risks associated with using smartphones for contactless payment transactions.
-
How Can You Avoid a Web Security Breach? It's All in the Preparation
Sponsored by: TechTarget SecurityIn this e-guide, from SearchCompliance.com, discover simple steps in order to avoid web security breaches.
-
What secure email gateways can do for your enterprise
Sponsored by: TechTarget SecurityIt is important to evaluate secure email gateways before implementing them in your organization. Here's a look at some of the best email security gateway products in the industry, as well as implementation, cost and uses.
-
Why EDR Technologies are Essential for Endpoint Protection
Sponsored by: TechTarget SecurityWhile an organization's most valuable and sensitive data and systems are usually well-protected on interior servers situated inside data centers and behind firewalls, it is on the network endpoints where external attacks begin. In this handbook, learn how to address endpoint security issues in your organization.
-
Malware Hitching a Ride on Mobile Apps?
Sponsored by: TechTarget SecurityThe latest mobile app security threats ride into enterprises on employee devices, but you can learn the latest strategies for improving corporate BYOD security.
-
Mastering the Top Enterprise Mobility Challenges
Sponsored by: MicrosoftMobility is bringing new concerns that didn't exist with desktops. Protecting company data while staying compliant is a new challenge for IT admins. This e-guide explores how to handle the top five issues in today's mobile world.
-
It's time to tackle IoT security
Sponsored by: Ruckus WirelessThe forecasts for IoT are huge. Some suggest that there will be 50 billion devices connected by 2020. Whether or not that prediction is accurate, it's clear that IoT is gaining meaningful market momentum, buoyed by an endless array of applications. Unfortunately, they are creating a multitude of security vulnerabilities and attack surfaces.
-
Securing Your Network in the Wireless Age
Sponsored by: Aruba NetworksIn this e-guide, you will learn how enterprise WLAN is growing in size and importance, driving up the need for more secure wireless network. Find out how vulnerable your wireless network could be and what happens when WLAN security is ignored.
-
Secure Your Internal Corporate Networks With ABAC
Sponsored by: CryptzoneIn this e-guide, discover how ABAC can provide your network with a robust security method that addresses security issues caused by growing remote access and BYOD trends. You will also learn how continuous network security monitoring can allow your enterprise to detect and prevent future cyber-attacks from occurring.
-
Protecting Data on the Go
Sponsored by: TechTarget SecurityThis guide informs InfoSec pros on the risks to business data carried on or accessed by employees' mobile devices and the best available protections for this business data on the go.
-
Information Security Magazine: August Issue
Sponsored by: TechTarget SecurityIdentity and access management is so complex that many companies have faltered when it comes to securing third-party vendors. With breaches on the rise, vulnerabilities can be costly.
-
The Transformation of Wireless Network Security
Sponsored by: TechTarget SecurityThis expert guide outlines what you need to know in order to integrate Wi-Fi security into your overarching network security strategy. Read on to learn about how to effectively maintain robust security in the age of wireless connectivity.
-
Why Corporate Data Security Requires a Major Policy Shift in the Age of BYOD
Sponsored by: TechTarget SecurityTransitioning from Mobile Device Management (MDM) to Enterprise Mobile Management (EMM) can be daunting. Explore the key differences between EMM and MDM, how EMM features support security objectives, strategies to align EMM and MIS departments, and more.
-
Network Protection and UTM Buyer's Guide
Sponsored by: SophosThis white paper explores how this UTM solution can provide the highest standards of network security within the cloud, while integrating multiple security capabilities on a single platform.
-
How to Handle Mobile Devices' Impact on the Network
Sponsored by: TechTarget NetworkingThe number and complexity of mobile devices on the enterprise network are expanding, gobbling up bandwidth from the WLAN infrastructure. This technical guide will help you prep your network for the higher capacity demands of next-stage BYOD. Learn what challenges you must overcome in the coming months.
-
BYOD File Sharing – Go Private Cloud to Mitigate Data Risks
Sponsored by: Accellion, Inc.Read this whitepaper to learn about a solution that can help you stay safe while going mobile, working with cloud file sharing, and more.
-
IM Wireless Network Assessment
Sponsored by: Ingram MicroThe need to protect your data and organization is now even more critical than before. Take a look at this brief white paper to learn how one company can help you secure your business.
-
Explaining How Trusted SSL Certificates and Forged SSL Certificates Work
Sponsored by: Symantec CorporationWeb security relies on valid, trusted SSL certificates. Michael Cobb, founder and managing director of Cobweb Applications Ltd., explains in this expert e-guide how forged SSL certificates undermine the security model. Once trust is lost, business is lost. Read this e-guide to discover why maintaining this trust is important.
-
Why Switch to Thawte?
Sponsored by: Thawte Inc.This brief resource provides three key reasons why you should switch to a leading online security provider trusted by millions around the world.
-
Antivirus Evaluation Guide
Sponsored by: Threat Track SecurityIn this white paper, you will learn how to choose the antivirus solution that can effectively keep your network free of malware. In three simple steps you can implement an easy-to-deploy and easy-to-replicate testing curriculum that enables you to most accurately assess your company's solution's capabilities.