IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cell Phone Spam

RSS Feed   
Cell Phone Spam Reports
 
Detect and Prevent Identity Theft
sponsored by SAS
WHITE PAPER: In this white paper, discover how advanced analytics can uncover the fast-growing incidence of synthetic identities today.
Posted: 18 Mar 2019 | Published: 18 Mar 2019

SAS

SAS Model Risk Management
sponsored by SAS
WHITE PAPER: The regulatory scrutiny being applied to model risk management is intensifying. As a result, banks need to maintain an inventory of models. In this white paper, learn how SAS Model Risk Management can help reduce the manual effort required to appropriately inventory, manage, document, communicate, monitor changes and audit firmwide models.
Posted: 20 Mar 2019 | Published: 20 Mar 2019

SAS

Why Homomorphic Encryption Alone is Security, Not Privacy
sponsored by Immuta, Inc
WHITE PAPER: If privacy is your goal, carefully consider the differences between privacy techniques and security techniques. Privacy can be improved with techniques like differential privacy and homomorphic encryption, but for totally different reasons. Read on to learn more.
Posted: 14 Mar 2019 | Published: 14 Mar 2019

Immuta, Inc

Endpoint Zero Trust Protection in a Connected World
sponsored by AppGuard
RESOURCE: In this resource, discover the security capabilities of AppGuard and how your organization could benefit from its zero-trust protection strategy.
Posted: 18 Mar 2019 | Published: 18 Mar 2019

AppGuard

Zscaler Cloud Security Insights
sponsored by Zscaler
WHITE PAPER: Organizations that are not inspecting all encrypted traffic are at increased risk of infiltration and infection that can spread and wreak havoc. Download this white paper to learn about a multilayer defense-in-depth strategy that can fully support SSL inspection and keep your enterprise secure from SSL threats.
Posted: 18 Mar 2019 | Published: 18 Mar 2019

Zscaler

Automating Phishing Investigations at the No. 1 Managed Cloud Company
sponsored by Splunk Services UK Ltd
CASE STUDY: Rackspace implemented Splunk Phantom to investigate phishing emails. Using Phantom's Apps and Playbooks, Rackspace is able to quickly execute actions, ensuring a repeatable and auditable process for remediating phish. In this case study, explore the benefits that Rackspace has seen since deploying Phantom.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Splunk Services UK Ltd

3 Keys to Cloud Security
sponsored by Rackspace
RESOURCE: The cloud has many benefits, but as its adoption grows, security is still a major issue. In this infographic discover a three-pronged approach to enable cloud security at your organization today.
Posted: 13 Mar 2019 | Published: 13 Mar 2019

Rackspace

Security vs. Mobility in Today's Workplace
sponsored by HP
JOURNAL ARTICLE: BYOD isn't going anywhere, so it's up to IT to make sure mobile security practices are as painless as possible. In this article, learn how different forms of authentication can help your organization balance security vs. mobility today.
Posted: 13 Mar 2019 | Published: 13 Mar 2019

HP

Transforming IT into a Catalyst for Business Growth
sponsored by ServiceNow
WHITE PAPER: Discover how ServiceNow's Change and Governance framework can help establish a higher degree of change clarity, regulatory compliance, and ultimately increase the visibility and strategic value of the entire change portfolio.
Posted: 19 Mar 2019 | Published: 19 Mar 2019

ServiceNow

How to Ensure Data Privacy in Public Clouds
sponsored by Radware
RESOURCE: The responsibility to protect the public cloud is a relatively new task for most enterprises. But, everything in the cloud is external and accessible if it is not properly protected with the right level of permissions. Read on to learn how organizations are incorporating smart configuration hardening to protect themselves today.
Posted: 11 Mar 2019 | Published: 11 Mar 2019

Radware
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement