IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cell Phone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Cell Phone SpamReports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Internet Gateway Security – A state of the nation
sponsored by Icomm Technologies
WHITE PAPER: In this in-depth white paper, discover how new next generation firewalls can protect organisations against dangerous threats as well as address the vulnerabilities created by new technologies like cloud computing and mobilisation.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

Icomm Technologies

Website Security Threat Report 2014
sponsored by Symantec Corporation
WHITE PAPER: In 2013, attention was focused on threats to privacy and acts of malicious insiders.  However, the end of the year provideded a painful remind that cybercime remains prevalent today.
Posted: 26 Sep 2014 | Published: 30 Jun 2014

Symantec Corporation

How Effective is Cloud-Provided Encryption?
sponsored by CipherCloud
RESOURCE: This blog post points out the issues surrounding cloud-provided encryption, and to keep in mind that not all solutions are created equal.
Posted: 25 Sep 2014 | Published: 22 Jul 2014

CipherCloud

Fighting Mobile Fraud: Protecting Businesses and Consumers from Cybercrime
sponsored by iovation, Inc.
WHITE PAPER: This white paper highlights the continuous fight against mobile fraud, and introduces a solution that protects businesses from online threats in real-time.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

iovation, Inc.

How the Right Conversations Can Accelerate Digitisation
sponsored by Sungard
WHITE PAPER: This white paper explores the importance of developing a digital strategy. Read on to learn how you can better explore and utilize your data. You'll get insight as to how you can achieve alignment between business and IT executives and develop a continuous conversation to shape the future direction of your organization.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

Sungard

Preventing Today's Mega-DDOS Attacks
sponsored by Solutionary
EGUIDE: In this expert eGuide, get an inside look at the mechanics of DDoS attacks and how organizations can best detect and prevent them.
Posted: 24 Sep 2014 | Published: 24 Sep 2014

Solutionary

DDos Survival Handbook
sponsored by Singlehop
WHITE PAPER: This handbook is the survival guide to fight off cyber attackers and mitigate the risk of DDoS attacks.
Posted: 29 Sep 2014 | Published: 31 Dec 2013

Singlehop

Avoiding BYO Policy and Security Pitfalls
sponsored by Citrix
WHITE PAPER: When employees use their own technology for business purposes, they gain mobility and productivity but pose a new threat for IT security, as well as other policy pitfalls.
Posted: 26 Sep 2014 | Published: 26 Sep 2014

Citrix

Know Map Reduce? No Problem!
sponsored by Rackspace
RESOURCE: Learn about the differences between Hadoop and MapReduce technology, the challenges that accompany MapReduce and the best way to incorporate this technology into your business.
Posted: 01 Oct 2014 | Published: 29 Apr 2013

Rackspace
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement