IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Mobile Phone Spam

RSS Feed   
Mobile Phone Spam White Papers (View All Report Types)
Top Five Challenges in Protecting APIs
sponsored by Wallarm
WHITE PAPER: APIs represent the core set of functionalities for modular applications today—consequently, protecting these APIs is now high priority. In this guide, learn what key issues need to be considered to ensure API security and robustness, from complicated data protocols to the difference between good and bad payloads.
Posted: 18 Mar 2020 | Published: 18 Mar 2020


Building Cloud Services for Security: 3 Common Misconfigurations
sponsored by DivvyCloud
WHITE PAPER: Ensuring the secure configuration of a distributed set of cloud services is a critical piece to cloud transformation. In fact, most risk areas related to cloud come from security misconfigurations. This white paper highlights 3 common misconfigurations and explores ways to fix them or prevent them from happening.
Posted: 07 Apr 2020 | Published: 07 Apr 2020


Global Partners
sponsored by TITUS
WHITE PAPER: To bring best-of-breed data classification solutions to enterprise customers across the globe, Titus relies on partnerships with recognized security technology companies as well as solution providers in every region. Download this white paper to learn more about Titus’s global partners.
Posted: 03 Apr 2020 | Published: 03 Apr 2020


A Guide to Verifying Users for Marketplaces
sponsored by Vonage
WHITE PAPER: Online shopping has completely changed the way organizations interact with their customers. However, these marketplaces make attractive targets for fraudsters and cybercriminals. In this guide, discover a frictionless method for verifying your users: phone verification with two-factor authentication.
Posted: 26 Mar 2020 | Published: 26 Mar 2020


Detecting Domain-Specific Coding Errors with Static Analysis
sponsored by Valbrio
WHITE PAPER: Advanced static analysis tools can perform whole-program analyses that dig deeper into code. This guide elaborates on the qualities of advanced static analysis tools, and how these tools are now an essential for software developers and security teams alike. Download the guide here.
Posted: 06 Mar 2020 | Published: 06 Mar 2020


Principles for Securing DevOps
sponsored by Veracode, Inc.
WHITE PAPER: DevOps is transforming the way organizations create, test and release software. An emerging advancement in DevOps is the inclusion of security into software development lifecycle. This white paper highlights 5 key principles for integrating security into the software development lifecycle in order to meet security goals.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Veracode, Inc.

A Guide to Verifying Users in E-Commerce
sponsored by Vonage
WHITE PAPER: In this guide, learn how to prevent fraud before it happens and protect buyers and sellers with phone verification with two-factor authentication.
Posted: 24 Mar 2020 | Published: 24 Mar 2020


Prioritizing Client-Side Website Security: Doing Nothing Is the Most Expensive Choice
sponsored by Tala Security
WHITE PAPER: When it comes to budgeting for investments in website security, the high price tags associated with acquiring additional tools or personnel makes some business leaders hesitant. In this white paper, learn how to calculate ROI by looking at the cost of breaches and discover the price of inaction.
Posted: 01 Apr 2020 | Published: 01 Apr 2020

Tala Security

4 Keys to Automating Threat Detection, Threat Hunting and Response
sponsored by Fidelis
WHITE PAPER: When it comes to detecting and responding to threats and preventing data loss, speed and accuracy are everything as the machine initially compromised is almost never the one the intruder needs to accomplish his or her objective. In this white paper, explore 4 keys to maturing your advanced threat defense.
Posted: 12 Mar 2020 | Published: 12 Mar 2020


The Third Annual Study on the State of Endpoint Security Risk
sponsored by Morphisec, Inc.
WHITE PAPER: In this year’s annual study into the state of endpoint security risks take a closer look at the perception endpoint security, current trends, tactics and statistics. One noteworthy finding from the study is that 68% of respondents reported one or more attacks in 2019 that resulted in a compromised endpoint. Read on to unlock the full report.
Posted: 17 Mar 2020 | Published: 31 Jan 2020

Morphisec, Inc.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.


All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info