IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cellphone Spam

RSS Feed    Add to Google    Add to My Yahoo!
Cellphone Spam Reports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

Monitoring Serverless Architectures in AWS
sponsored by AWS-Cisco
WHITE PAPER: The introduction of serverless architectures is helping reduce exposure to threats by breaking services into single-purpose functions with well-defined inputs and outputs. This white paper discusses methods of auditing and monitoring of Amazon Web Services Lambda functions and how to put these methods into practice.
Posted: 03 Nov 2017 | Published: 03 Nov 2017

AWS-Cisco

DevOps Best Practices in Release and Deployment Management
sponsored by MicroFocus
WHITE PAPER: Explore DevOps best practices for transforming release and deployment management. Find out how to break down the walls between your IT and development teams, and uncover tips on how to optimize your use of automation, integrate your deployment/delivery toolchain, and more.
Posted: 16 Nov 2017 | Published: 16 Nov 2017

MicroFocus

15 Essential DNS and DNSSEC Monitoring Tests
sponsored by Men and Mice
WEBCAST: Don't fall short on your Internet security strategy. In this webcast, you can learn how to use 15 essential DNS and DNSSEC monitoring tests to help your organization detect concerns before your network performance is impacted.
Posted: 03 Nov 2017 | Premiered: Nov 10, 2016

Men and Mice

The Hiker's Guide to Software Security
sponsored by Synopsys
WHITE PAPER: Uncover 7 key considerations for building app security seamlessly into your software development and deployment initiatives.
Posted: 07 Nov 2017 | Published: 07 Nov 2017

Synopsys

Security at Scale with Cloud Computing - A Minute in the Life of Google
sponsored by Google Cloud
WHITE PAPER: "No one in today's highly connected world is exempt from security threats like phishing, ransomware, or denial-of-service (DoS) attacks.
Posted: 21 Nov 2017 | Published: 21 Nov 2017

TOPICS:  IT Management
Google Cloud

How Enterprises are Streamlining with Chromebooks
sponsored by Google Cloud
WHITE PAPER: How can CIOs provide employees with the latest, most secure laptops that are simple to integrate into an enterprise environment? In this report, learn how IT leaders at Charles Schwab, Scheels and two other large companies streamlined operations with Chromebooks.
Posted: 21 Nov 2017 | Published: 21 Nov 2017

TOPICS:  IT Management
Google Cloud

The GDPR Compliance Checklist
sponsored by Citrix
RESOURCE: The General Data Protection Regulation (GDPR) will be effective on May 25, 2018. Download this checklist to see what your organisation needs to do to stay ahead of the GDPR.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

Citrix

Bots Mean Business
sponsored by F5 Networks
WHITE PAPER: As bot technology, machine learning, and AI continue to evolve, so will the cyber threats they pose. This paper explores how bot innovation enables cybercrime and how you can optimize business intelligence while protecting your enterprise.
Posted: 17 Nov 2017 | Published: 17 Nov 2017

F5 Networks

Game Changer: Emergency SaaS Notifications Enabled by the Hybrid Cloud
sponsored by TeraGo Networks
CASE STUDY: In this case study, learn how RMS Software Inc. was able to secure their SaaS-based emergency notification system using hybrid cloud capabilities.
Posted: 06 Nov 2017 | Published: 06 Nov 2017

TeraGo Networks
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2017, TechTarget | Read our Privacy Statement