Wireless Networks


open source vulnerability hacking

The Dangers of Open-Source Vulnerabilities, and What You Can Do About It

Neglecting basic security practices exposes companies to long-standing security threats.

secure tablet

How Deception Technology Can Help You Detect Threats Early

Deploying automated decoys can help protect your network and reduce IT costs.

Russian Hacking Group is Targeting Corporate IoT Devices, Microsoft Researchers Say

Russian Hacking Group is Targeting Corporate IoT Devices, Microsoft Researchers Say

The state-sponsored hackers, best known as Fancy Bear, attempted to compromise popular IoT devices like office printers and a VOIP phone.

Rebuilding Trust After Cybersecurity Lapses

Rebuilding Trust After Cybersecurity Lapses

Promising to prevent a re-occurrence is not nearly enough to repair the damage with clients.

wifi router office

IoT Security: Current Threats and How to Overcome Them

Connecting devices to a 0G network is a simple fix to seemingly insurmountable challenges.

work wifi

10 Simple Steps to Take Right Now to Secure Your Business WiFi Network

Conducting regular maintenance and updates are the easiest ways to secure your corporate WiFi network

Pentagon aerial shot

Following Court Decision, Amazon and Microsoft Set to Compete Over Military’s Cloud Computing Contract

The $10 billion JEDI project has been rife with controversy, but the Pentagon still hopes to seal the deal with one of the companies next month.

Federal Election Commission

Cybersecurity Company Can Offer Discounted Services to Campaigns, FEC Rules

A California-based company has been given the OK to offer its services to campaigns for a discounted rate ⁠— as long as that rate is the same for other clients.



Employees Still Struggle to Identify Phishing Threats and Properly Protect Their Data, Report Finds

Respondents, who answered 22 percent of questions incorrectly, struggled most with assessments about mobile device encryption and protections for personally identifiable information.

Zoom headquarters

Flaw in Video Conferencing App Could Have Given Hackers Immediate Access to Webcam Feeds

The company, Zoom, is now taking action to update its software after a security researcher discovered several serious security vulnerabilities in the popular video chat app.

power towers

Senate Passes Bill To Explore ‘Analog’ Solutions to Securing America’s Energy Grid

If the Securing Energy Infrastructure Act is signed into law, it will create a working group tasked with isolating the energy grid from attacks using “manual procedures.”

georgia county courthouse

Georgia Court System Goes Offline After Ransomware Attack

The attack, which was discovered Monday, comes shortly after two Florida cities agreed to pay ransoms in order to recover their computer systems from hackers.

Cloud Security Research Reveals Challenges, Areas of Growth in Upcoming Years

Cloud Security Research Reveals Challenges, Areas of Growth in Upcoming Years

While cloud services are becoming increasingly popular for business use, cyberattacks on cloud services are also growing. This has prompted a rise in cloud security software.

Cisco Announces Plan to Acquire Sentryo

Cisco Announces Plan to Acquire Sentryo

Cisco recently announced that it plans to acquire Sentryo in order to optimize visibility, segmentation, and operations for Cisco customers.

Japan to Check 200 Million Devices for Cybersecurity Risks

Japan to Check 200 Million Devices for Cybersecurity Risks

As part of the preparations for next year’s summer Olympics in Tokyo, Japan’s National Institute of Information and Communications Technology will check about 200 million internet-connected devices for potential cybersecurity vulnerabilities.

The Next Wave

Originally designed as consumer devices, smartphones have become vital elements of both our personal and professional lives.

Simplicity and Flexibility

Simplicity and Flexibility

Wireless technology in the security space is on the cusp of becoming the new norm. For the past few years we’ve seen the adoption of the technology grow steadily as it continuously improves upon traditional security solutions.

Comparing Wireless Communication Protocols

Wi-Fi is a technology based on the IEEE 802.11 suite of standards that uses radio frequencies (RF) extend wired Ethernet-based local area networks (LAN) to Wi-Fi-enabled devices, allowing the devices to receive and send information from the internet.

Wi-Fi Security Sees Toughest Upgreat in a Decade

Wi-Fi Security Sees Toughest Upgrade in a Decade

\Wi-Fi Alliance is looking to beef up security with an updated protocol

New Uber Security Feature Connects You with 911 in the Event of an Emergency

New Uber Security Feature Connects You with 911 in the Event of an Emergency

Uber is adding security and safety features to its mobile app to help users feel safe while ride-sharing.

Digital Edition

  • Security Today Magazine - July August 2019

    July/August 2019

    Featuring:

    • A Winning Security Plan
    • Moving to the Door
    • Relying on Power
    • Thermal Imagers Deployed
    • Using Mass Notification

    View This Issue

  • Environmental Protection
  • Occupational Health & Safety
  • Infrastructure Solutions Group
  • School Planning & Managmenet
  • College Planning & Management
  • Campus Security & Life Safety