New & Notable
Wireless and mobile security News
March 24, 2020
What's happening at the 2020 RSA Conference? Our team keeps you up to date with pre-conference coverage and breaking news from the infosec world's biggest event.
February 28, 2020
Experts at RSA 2020 said the United States and its allies have to solve trade disputes and combine resources to secure global 5G infrastructure against Chinese threats.
February 27, 2020
At the RSA 2020 conference, experts said enterprise-class 5G services are years away. Obstacles include security and doubts about profitability.
January 29, 2020
OpenText's chief product officer discusses how the recently acquired Carbonite -- which had recently acquired Webroot -- fits into the content services provider's product roadmap.
Wireless and mobile security Get Started
Bring yourself up to speed with our introductory content
Explore the differences between wired and wireless network security, and read up on best practices to ensure security with or without wires. Continue Reading
The policies organizations should deploy for BYOD devices compared to kiosk devices are very different. Learn how organizations should approach these policy decisions. Continue Reading
Explore the differing roles of inbound versus outbound firewall rules for enterprise network security and the varying use cases for each. Continue Reading
Evaluate Wireless and mobile security Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
The fifth generation of mobile cellular technology offers a unique benefit its predecessors don't: network slicing. Learn more about these virtual slices and their security benefits. Continue Reading
Compare and contrast the mobile testing tools from the big three cloud vendors -- AWS Device Farm, Google Firebase Test Lab and Microsoft Visual Studio App Center Test. Continue Reading
As wireless network technologies have evolved, so too have the wireless security protocols for securing them. Get a quick overview of the three WLAN security standards, and learn the differences among WEP, WPA and WPA2. Continue Reading
Manage Wireless and mobile security
Learn to apply best practices and optimize your operations.
BYOD policies aren't the same as corporate-owned device policies, so organizations must factor in regulatory concerns and mobile app management before they create the policy. Continue Reading
City ransomware attacks are disruptive, annoying and potentially life-threatening. In increasingly mobile and perimeterless networks, how can municipalities prevent the risk? Continue Reading
IAM is an organization's best defense for its weakest link, end users. Make sure you're following the right framework and keeping your tools honed and ready for battle. Continue Reading
Problem Solve Wireless and mobile security Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Learn about the planning of 3GPP in developing specifications for 5G security in this synopsis of 5G Americas' white paper, 'The Evolution of Security in 5G.' Continue Reading
The benefits of 5G are aplenty, but the next-generation LTE technology also presents a number of risks. Learn how to securely deploy 5G in your enterprise. Continue Reading
The most common wireless network attacks change over time, but not that much. Find out which tactics still work for attackers and how to defend against them. Continue Reading