IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cell Phone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Cell Phone Spam Reports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Online Job Marketplace Airtasker Migrates to AWS
sponsored by Rackspace
VIDEO: In this video, Paul Keen, Airtasker CTO, discusses the need to meet the demands of their developing growth, and how moving to a stable AWS environment helped them scale automatically and seamlessly during intensive peak periods. Tune in to see how AWS can help you reach an advanced state of DevOps capability, and more.
Posted: 19 Apr 2017 | Premiered: 22 Mar 2017

Rackspace

How Oracle SPARC S7 Server Compares to Its Competition
sponsored by Oracle Corporation
WHITE PAPER: The paper discusses the performance, risk management , and total cost of ownership (TCO), and highlights the advantages that the Oracle SPARC S7 Server delivers.
Posted: 24 Apr 2017 | Published: 30 Nov 2016

Oracle Corporation

Media Consumption Study 2017 UKI
sponsored by ComputerWeekly.com
EGUIDE: The results of TechTarget and Computer Weekly's annual reader survey, which asks for feedback on readers' media consumption when considering an IT purchase, reveals the complexity of IT purchase decisions.
Posted: 28 Apr 2017 | Published: 27 Apr 2017

ComputerWeekly.com

Achieving Optimal IFRS 9 Compliance
sponsored by SAS
WHITE PAPER: Learn how to comply with IFRS 9 by using technology to optimally approach the implementation challenges it creates. Discover what's driving the IFRS 9 accounting standard, technology and partners for optimal IFRS 9compliance, and more.
Posted: 24 Apr 2017 | Published: 24 Apr 2017

SAS

Identity Management: The Key to Stopping Breaches
sponsored by SailPoint Technologies
WHITE PAPER: With 43% of breaches caused by insiders, organizations need to find a better way to handle identity. Discover how to not only secure identities, but turn it into a business enabler, give your organization the power to build a modern security infrastructure that is centered around your users and their access to your data, and more.
Posted: 24 Apr 2017 | Published: 24 Apr 2017

SailPoint Technologies

How to Gain Unified Endpoint Management in Your Mobile Computing Network
sponsored by IBM
WHITE PAPER: The complexity of managing a mobile strategy can often make you feel like you have to choose between security and productivity. You can put this issue in the past however, with this unified endpoint management tool that leverages insights from big-data analytics to secure all your mobile devices.
Posted: 28 Apr 2017 | Published: 31 Mar 2017

IBM

The currency of trust: why banks and insurers must make customer data safer and more secure
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Banks and insurers enjoy a significantly higher level of trust from consumers in the cyber security of their systems than any other sector, but the financial services industry is less confident in its ability to detect security breaches, this report from Capgemini reveals.
Posted: 25 Apr 2017 | Published: 25 Apr 2017

ComputerWeekly.com

Password Security Checklist: Ensure PCI Compliance
sponsored by Specops Software
WHITE PAPER: Uncover vital questions to provide your organization with a good starting point on the path to improving your password security.
Posted: 18 Apr 2017 | Published: 18 Apr 2017

Specops Software

Hackers Share Secrets so You Can Make Their Job Harder
sponsored by Thycotic
WHITE PAPER: Discover 5 secrets hackers shared at the 2016 Black Hat conference that you can use to make their jobs more difficult and secure your passwords and privileged accounts.
Posted: 19 Apr 2017 | Published: 31 Dec 2016

Thycotic
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement