New & Notable
Wireless and mobile security News
July 13, 2020
RSA Security researchers found that nearly 70% of phishing attacks were directed at users in Canada, while the majority of attacks come from U.S.-based ISPs and hosting providers.
June 16, 2020
Trend Micro's Zero Day Initiative published 10 vulnerabilities in Netgear's R6700 router that have gone unpatched for seven months.
May 26, 2020
A new elevation-of-privilege vulnerability on Android, dubbed StrandHogg 2.0, allows threat actors to gain access to most apps, according to Norwegian mobile security firm Promon.
May 22, 2020
This week's Risk & Repeat podcast examines the rise of mobile voting apps and how security experts have expressed concerns about the risks deploying the technology for elections.
Wireless and mobile security Get Started
Bring yourself up to speed with our introductory content
When securing home Wi-Fi, update devices regularly, change passwords consistently and consider splitting your WLAN into two segments: one for work and one for play. Continue Reading
Given the differences in the security of LAN and WAN, enterprises need to guard against insider threats, secure against unauthorized access and potentially secure the edge, too. Continue Reading
Explore the differences between wired and wireless network security, and read up on best practices to ensure security with or without wires. Continue Reading
Evaluate Wireless and mobile security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Learn about the different mobile security models that organizations can choose from and how vendors combine cloud-based threat defense with on-device security. Continue Reading
As smart card adoption increases, it is prudent to take a closer look at how this technology can improve data security. Here, read more about the benefits of smart cards. Continue Reading
IoT security tools can protect widely used computing devices that pose cybersecurity risks in the current remote work era. Explore the leading cloud-based options here. Continue Reading
Manage Wireless and mobile security
Learn to apply best practices and optimize your operations.
Building a data protection strategy around remote working requires companies to enable employee access to data while ensuring that it is protected from threats such as shadow IT. Continue Reading
What's happening at the 2020 RSA Conference? Our team keeps you up to date with pre-conference coverage and breaking news from the infosec world's biggest event. Continue Reading
The policies organizations should deploy for BYOD devices compared to kiosk devices are very different. Learn how organizations should approach these policy decisions. Continue Reading
Problem Solve Wireless and mobile security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
The worldwide health pandemic has created multiple challenges for today's CISOs and their security teams. Ask these three questions to stay safe in a post-pandemic workplace. Continue Reading
Post-pandemic, organizations must strike the right balance between on-site and work-from-home cybersecurity. Here's how to make sure your cybersecurity program is prepared. Continue Reading
Learn about the planning of 3GPP in developing specifications for 5G security in this synopsis of 5G Americas' white paper, 'The Evolution of Security in 5G.' Continue Reading