IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cellphone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Cellphone Spam Reports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

How to Develop Mobile Applications Using Windows 10
sponsored by Pluralsight
WEBCAST: In this webinar, Windows Platform Development MVP and Pluralsight author Lars Klint outlines the Windows 10 upgrade and what it brings to bear on developing enterprise mobile applications, including benefits and services Windows offers as an app developer platform.
Posted: 03 Sep 2015 | Premiered: Sep 3, 2015

Pluralsight

Best Practices for the Next-Generation Data Centre
sponsored by Dimension Data
WHITE PAPER: This white paper discusses some of the best practices organizations can adopt to ensure that their journey to the next-generation data center remains on track.
Posted: 01 Sep 2015 | Published: 01 Sep 2015

Dimension Data

What if your App Virtualization Solution Didn't Include Image Deployment?
sponsored by Dell, Inc.
VIDEO: This video imagines the life of an IT professional whose application virtualization solutions don't include image virtualization. Watch now to see why it's important to have app virtualization technology that prevents excessive frustration and streamlines IT processes.
Posted: 03 Sep 2015 | Premiered: 03 Sep 2015

Dell, Inc.

Security Essentials for CIO's: Responding to Inevitable Incident
sponsored by IBM
WHITE PAPER: This white paper lists a seven-step process you can take to ensure that your enterprise knows exactly what to do when a security incident occurs.
Posted: 28 Aug 2015 | Published: 31 Aug 2012

IBM

Oak Ridge National Laboratory's Cybersecurity and Beyond
sponsored by Splunk
WEBCAST: View this webcast to learn how Oak Ridge National Laboratory tweaked their security strategy to gain real-time threat alerts through big data analytics. View now to learn how to understand the big picture about your network's security.
Posted: 03 Sep 2015 | Premiered: Jan 18, 2014

Splunk

Building Digital District Leadership with Lenovo: A Portfolio of Solutions for Every Challenge
sponsored by Lenovo & Intel
WHITE PAPER: This resource, the Lenovo® How to Guide for Designing Your Digital District, will help you identify your district's technology needs and match them to the right products.
Posted: 26 Aug 2015 | Published: 26 Aug 2015

Lenovo & Intel

Eight Essential Elements for Effective Threat Intelligence Management
sponsored by BrightPoint Security
WHITE PAPER: This white paper contains eight techniques you can adopt to keep up with the ever-shifting threat intelligence landscape.
Posted: 27 Aug 2015 | Published: 27 Aug 2015

BrightPoint Security

An IT Survival Guide: Big Chaos in Small Packages
sponsored by Lenovo and Microsoft
WHITE PAPER: Read the following white paper to learn about the steps you can take to minimize loss or destruction when devices leave work.
Posted: 26 Aug 2015 | Published: 26 Aug 2015

Lenovo and Microsoft

Hybrid Cloud Security Is No Castle in the Air
sponsored by SearchSecurity.com
EZINE: In this issue of Information Security magazine, we look at hybrid cloud security and five strategies that CIOs have used to secure these environments.
Posted: 01 Sep 2015 | Published: 01 Sep 2015

TOPICS:  Security
SearchSecurity.com
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement