IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cell Phone Spam

RSS Feed   
Cell Phone Spam Reports
 
The Modality of Mortality in Domain Names
sponsored by Farsight Security
RESEARCH CONTENT: In this study, Farsight Security monitored an ongoing data feed of newly observed domains (NODs) to generate a cohort data set, and periodically probed those names to determine what happens to them. Learn more about NODs to help your organization create a more secure DNS policy and improve its security posture.
Posted: 15 Mar 2019 | Published: 31 Oct 2018

Farsight Security

Optimizing SIEM
sponsored by One Identity
WHITE PAPER: SIEM solutions form the core of many enterprises' IT Security strategy but they can be expensive to deploy and maintain. Optimizing your SIEM solution can reduce costs and improve performance. In this white paper, learn about the challenges, solutions and benefits of optimizing your SIEM solution.
Posted: 15 Mar 2019 | Published: 15 Mar 2019

One Identity

Detect and Prevent Identity Theft
sponsored by SAS
WHITE PAPER: In this white paper, discover how advanced analytics can uncover the fast-growing incidence of synthetic identities today.
Posted: 18 Mar 2019 | Published: 18 Mar 2019

SAS

Seamless Application Security: Security at the Speed of DevOps
sponsored by Micro Focus
WHITE PAPER: Download this guide to learn how developers can start to leverage integrations to make application security a more natural part of the lifecycle – without slowing down innovation.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Micro Focus

Why Every Business Needs a Smart Printing Services Strategy
sponsored by HP
RESOURCE: Network-connected printers are more insecure than most organizations realize. With security threats on the rise businesses of all sizes need printing services strategies to protect their organizations and minimize risk. In this article, learn how to craft a printer services strategy.
Posted: 15 Mar 2019 | Published: 13 Apr 2017

HP

The SIEM Buyer's Guide
sponsored by Splunk Services UK Ltd
WHITE PAPER: Today's most serious threats act across multiple systems and use advanced evasion techniques to avoid detection. Without a SIEM, attacks germinate and grow into catastrophic incidents. In this white paper, learn the basics of a SIEM, 7 essential capabilities of an analytics-driven SIEM and the 9 technical capabilities of a modern SIEM.
Posted: 25 Mar 2019 | Published: 25 Mar 2019

Splunk Services UK Ltd

Case Study Global Airline
sponsored by AppGuard
CASE STUDY: This major global airline needed to enhance their security measures, as a cyberattack could jeopardize passenger lives, harm reputation and revenue. Download this case study to find out how they saw success with AppGuard's endpoint protection tools.
Posted: 19 Mar 2019 | Published: 19 Mar 2019

AppGuard

2030: A Business Technology Forecast
sponsored by Dell and Intel®
WHITE PAPER: Flip through this collection of data points illustrating the results of a survey that quizzed 3,800 business, IT, and technology leaders across the world on their predictions for the 2030 technological landscape.
Posted: 14 Mar 2019 | Published: 15 Mar 2019

Dell and Intel®

Log Management Essentials
sponsored by One Identity
WHITE PAPER: In IT environments, a wide variety of sources generate log messages in many different formats. Whether you are trying to enhance security, improve operations or meet compliance objectives, log data contains valuable information and harnessing that data is critical. In this white paper, learn how to properly implement log management.
Posted: 18 Mar 2019 | Published: 18 Mar 2019

One Identity

The New Era of IT
sponsored by ServiceNow
RESOURCE CENTER: Check out this collection of resources designed to illustrate today's new era of IT, ranging from IT transformation case studies to live demos of cutting-edge ITSM software.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

ServiceNow
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement