IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cell Phone Spam

RSS Feed   
Cell Phone Spam Reports
 
6 Key Use Cases for Securing Your Organization’s Cloud Workloads
sponsored by Cyber-Ark Software
CASE STUDY: In order to ensure organizations are transitioning to the cloud responsibly, security programs need to be implemented that address the unique challenges each organization faces. In this collection of use cases, discover how 6 organizations overcame various cloud security challenges to ensure their data was protected.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Cyber-Ark Software

Principles for Securing DevOps
sponsored by Veracode, Inc.
WHITE PAPER: DevOps is transforming the way organizations create, test and release software. An emerging advancement in DevOps is the inclusion of security into software development lifecycle. This white paper highlights 5 key principles for integrating security into the software development lifecycle in order to meet security goals.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Veracode, Inc.

Big-IP Access Policy Manager
sponsored by F5 Networks
WHITE PAPER: Learn how F5 Big-IP Access Policy Manager delivers unified global access control for your users, devices, applications, and APIs.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

F5 Networks

Two Years of Active Cyber Defense Infographic
sponsored by Nominet
RESOURCE: Over the past two years, the partnership between the NCSC, GDS and Nominet has yielded the most widely used DNS cyber defense service across the UK public sector. This infographic highlights the key statistics and achievements of this partnership, including their 100% service availability.
Posted: 31 Mar 2020 | Published: 31 Mar 2020


Securing data across the enterprise while simplifying IT operations
sponsored by Thales
WHITE PAPER: The induction of data privacy laws has drastically changed organizational approaches to IT security. In this white paper, see how compliance has changed the landscape of data encryption & key management for IT security teams.
Posted: 27 Mar 2020 | Published: 31 Aug 2019

Thales

Core - DNS - Cybersecurity for Remote Workers
sponsored by Cisco Umbrella
EBOOK: In this e-book, discover the challenges facing today’s security professionals and some simple actions you can take to reduce malware, simplify security and secure a growing population of remote and roaming workers, without overburdening your staff.
Posted: 30 Mar 2020 | Published: 30 Mar 2020

Cisco Umbrella

Rethinking API Security
sponsored by Okta
VIDEO: APIs enable organizations with new avenues for enhancing business operations and customer experiences. In this session, we’ll cover the foundations of developing, securing, and managing access to the critical APIs that drive our business.
Posted: 26 Mar 2020 | Premiered: 26 Mar 2020

Okta

Encrypt Everything
sponsored by Thales
EBOOK: Today’s IT security leaders are tasked with ensuring enterprise-wide protection for sensitive data. However, challenges arise due to data residing in various platforms (like on-prem systems or in the cloud). In this e-book, discover an overview of a data protection method along with best practices to ensure security.
Posted: 26 Mar 2020 | Published: 30 Nov 2019

Thales

Ultimate Guide to Multi-factor Authentication
sponsored by Ping Identity Corporation
EGUIDE: When it comes to securing today’s distributed workforce, IT security teams spend their time focusing on preventing external attacks. However, carelessness in password security has proven to be key threat vector. In this blog post, discover how multi-factor authentication (MFA) can address these challenges.
Posted: 31 Mar 2020 | Published: 31 Mar 2020

Ping Identity Corporation

Your Path to a Mature AppSec Program
sponsored by Veracode, Inc.
WHITE PAPER: Although applications are critical to how businesses operate, web apps are among the top risk areas that hackers attempt to expose. In fact, nearly 40% of global data breaches originate at the application-layer. In this guide, discover what effective application security looks like and learn the steps you can take to reach app sec maturity.
Posted: 01 Apr 2020 | Published: 01 Apr 2020

Veracode, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info