IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cellphone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Cellphone Spam White Papers (View All Report Types)
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Protect Against WannaCry: A Ransomware "Weapon of Mass Destruction"
sponsored by arcserve
WHITE PAPER: Learn how to address your organization's vulnerability in the face of WannaCry, ensure you have real-world ransomware recovery in case of disaster, circumvent ransom demands and protect your data, and more.
Posted: 25 May 2017 | Published: 25 May 2017

arcserve

When It Comes to Cloud Security, What You Don't Know Can Hurt You
sponsored by evident.io
WHITE PAPER: Access this resource now to learn how to secure your cloud services and get a big-picture view across all of your cloud environments, lower costs, and more.
Posted: 18 May 2017 | Published: 18 May 2017

evident.io

Understanding and Mitigating DDoS Attacks
sponsored by Dyn
WHITE PAPER: Discover a number of DNS DDoS attack concepts and mitigation strategies and learn the critical role DNS plays in the performance of your online business, common types of DDoS attacks, best practices to protect your DNS infrastructure against DDoS attacks, and more.
Posted: 11 May 2017 | Published: 11 May 2017

Dyn

Defend Against New Security Threats to Your Data Center
sponsored by Bayshore Networks
WHITE PAPER: Discover how to defend your enterprise against the security challenges surrounding operational technology (OT) equipment required to support and maintain the modern data center.
Posted: 24 May 2017 | Published: 24 May 2017

Bayshore Networks

How Open Code Components Increasing Speed, But Also Risk
sponsored by Veracode, Inc.
WHITE PAPER: Learn how to handle the risk of open source components being used in the software that your organization uses, builds, and sells.
Posted: 10 May 2017 | Published: 10 May 2017

Veracode, Inc.

Use Case: Securing Data Centers
sponsored by Bayshore Networks
WHITE PAPER: In this use case, learn how to secure your vulnerable data centers. Also learn about proactive prediction of Industrial Controls failures, ROI associated with capital and maintenance costs, and more.
Posted: 26 May 2017 | Published: 26 May 2017

Bayshore Networks

The 6 Essential Capabilities of an Analytics-Driven SIEM
sponsored by Splunk
WHITE PAPER: Collecting and analyzing security data is no longer enough, today's business needs to be able to use a security event management (SIEM) platform to derive actionable intelligence from this information. Read this white paper to learn the 6 capabilities every SIEM needs to succeed.
Posted: 19 May 2017 | Published: 19 May 2017

Splunk

Waste Less Time Fighting Ransomware
sponsored by Cisco Umbrella
WHITE PAPER: In this resource, learn if Cisco's Umbrella can really block ransomware.
Posted: 26 May 2017 | Published: 30 Dec 2016

Cisco Umbrella

6 Vendor Risk Assessment Resource Drains to Avoid
sponsored by Rsam
WHITE PAPER: Discover 6 ways your organization may be allocating resources unnecessarily in remediating vendor risk.
Posted: 04 May 2017 | Published: 04 May 2017

Rsam
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement