IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cellphone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Cellphone Spam White Papers (View All Report Types)
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Top 10 Database Security Threats
sponsored by Imperva
WHITE PAPER: Practical applications for Big Data have become widespread, and Big Data has now become the new "prize" for hackers. This whitepaper explains common injection points that provide an avenue for attackers to maliciously access database and Big Data components.
Posted: 05 Oct 2015 | Published: 31 Dec 2014


Enhance Security Visibility to Improve Incident Response and Compliance
sponsored by OpenDNS
WHITE PAPER: In this white paper, explore the limitations of traditional security log measures such as firewalls, AD, and web proxies and why it's imperative to gain complete visibility over DNS and your network. View now to learn how to eliminate network security blind spots and enable your SIEM to detect masked cybersecurity threats.
Posted: 08 Oct 2015 | Published: 30 Sep 2015


Taking Control of Cloud Data: A Realistic Approach to Data Encryption
sponsored by Vaultive
WHITE PAPER: This paper outlines the new set of technical approaches for extending ownership and control for the computing model based on encryption in use, as well as distinguishes between evaluating the security and resiliency of the cloud service provider's environment.
Posted: 23 Sep 2015 | Published: 23 Sep 2015


Proactive Security Testing: Make Your Products Bullet-Proof
sponsored by Beyondsoft
WHITE PAPER: In this white paper, learn how truly secure products and infrastructure require testing and measurement, and how to you can implement vulnerability protection that is sustainable and cost-effective for bullet-proof security.
Posted: 24 Sep 2015 | Published: 24 Sep 2015


Four Considerations for Addressing the DDoS Risk for Carrier and Cloud Hosting Providers
sponsored by Radware
WHITE PAPER: In this white paper, you'll learn the four key considerations for addressing sophisticated DDoS attacks.
Posted: 02 Oct 2015 | Published: 15 Jan 2015


Gaining Visibility, Meaningful Information Security, and Fraud Data in Seconds
sponsored by WhiteHat Security
WHITE PAPER: In this white paper, you'll discover how to use big data for InfoSec and fraud analytics to strengthen your security strategy.
Posted: 01 Oct 2015 | Published: 18 Dec 2014

WhiteHat Security

A Practical Guide to Choosing the Right IT Systems
sponsored by Oracle & Intel
WHITE PAPER: In the following white paper, learn about the importance of choosing the right IT systems. Read on now and learn about the potential downfalls of choosing the inappropriate systems for your niche, where to turn for advice on the right systems, and more.
Posted: 22 Sep 2015 | Published: 22 Sep 2015

Oracle & Intel

2015 State of the Sysadmin Report
sponsored by Opsview Inc
WHITE PAPER: According to a recent survey, system administrators (sysadmins) know that they're important, but many feel that aren't valued by their co-workers. This report reveals the full results and contains key advice that will help sysadmins move up the ladder and command a higher salary increase.
Posted: 07 Oct 2015 | Published: 07 Oct 2015

Opsview Inc

Conference Room Video in a Microsoft Lync / Skype for Business Environment
sponsored by StarLeaf
WHITE PAPER: This resource lays out the need for quality video collaboration tools, and goes into detail about their merits and functionalities.
Posted: 01 Oct 2015 | Published: 01 Oct 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement