IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cell Phone Spam

RSS Feed   
Cell Phone Spam Reports
 
AV Replacement Guide
sponsored by CrowdStrike
WHITE PAPER: Antivirus is virtually universal, so why are so many attacks succeeding? Attackers expect their targets to be running some form of protection and have adapted their tools, techniques and procedures to evade detection. In this white paper, learn the most important elements to consider when replacing an antivirus or endpoint protection solution.
Posted: 04 Jun 2019 | Published: 04 Jun 2019

CrowdStrike

Modernize State and Local Government IT Infrastructure
sponsored by Dell EMC
RESOURCE CENTER: Gain access to a collection of case studies, resources, and videos that illustrate the importance of infrastructure modernization in government and public sector organizations – and in turn, how to leverage that infrastructure to drive digital transformation objectives forward.
Posted: 06 Jun 2019 | Published: 06 Jun 2019

Dell EMC

PCI Network Security Compliance For Kubernetes Platforms
sponsored by Tigera
WHITE PAPER: PCI DSS requires proper monitoring at the network level. The challenge with traditional network monitoring tools is that they generate inaccurate data for Kubernetes. In this white paper, learn how Tigera supports continuous PCI compliance that gives teams the ability to pinpoint any point in time and say with certainty if they were in compliance.
Posted: 13 Jun 2019 | Published: 13 Jun 2019

Tigera

Who needs malware? How Adversaries use Fireless Attacks to Evade your Security
sponsored by CrowdStrike
WHITE PAPER: According to CrowdStrike, 8 out of 10 attack vectors that resulted in a successful breach used fileless attack techniques. Access this white paper to learn how fileless attacks work and why traditional techniques fail to protect your organization.
Posted: 04 Jun 2019 | Published: 04 Jun 2019

CrowdStrike

Proofpoint and CSC help Blocket Reduce Suspicious Messages by 99%
sponsored by Proofpoint
CASE STUDY: Blocket AB, an e-commerce site, was facing a big email security challenge. Blocket had relied on awareness campaigns to help customers report phishing emails. However, there were still a number of customer service phishing inquiries. In this case study, learn how Blocket was able to block phishing emails with Proofpoint Email Fraud Defense.
Posted: 10 Jun 2019 | Published: 10 Jun 2019

Proofpoint

What Do You Mean TLS 1.3 Might Degrade My Security?
sponsored by Gigamon
WHITE PAPER: Read "What Do You Mean TLS 1.3 Might Degrade My Security?" to learn about the good, the bad and the ugly as the industry moves to this new encryption standard.
Posted: 11 Jun 2019 | Published: 11 Jun 2019

Gigamon

How to Re-Evaluate your Breach Protection
sponsored by Cynet
RESOURCE: If you think data breaches are a critical risk, you should consider shifting from a product-oriented to protection-oriented mindset. In this e-book, get a better understanding of the types of attacks you face and consider 3 key approaches to breach protection.
Posted: 04 Jun 2019 | Published: 04 Jun 2019


Building the Connected Campus in the Era of Digital Transformation
sponsored by DELL Boomi
WHITE PAPER: Jump into this executive brief to find out just how higher education institutions are building, integrating, and curating the IT environments their students need to achieve success – and ultimately, streamline their organization's day-to-day operations.
Posted: 12 Jun 2019 | Published: 12 Jun 2019

DELL Boomi

Cyber Intrusion Services
sponsored by CrowdStrike
WHITE PAPER: In this report, discover how the CrowdStrike Falcon can deliver the visibility and operational expertise necessary to stop breaches before adversaries can take control of your entire network, as well as stories from the front lines of incident response in 2018 and insights that matter for 2019.
Posted: 04 Jun 2019 | Published: 04 Jun 2019

CrowdStrike

MSSP Buyer's Guide: Grow Your Managed SOC Business with IBM Security
sponsored by IBM
PRODUCT OVERVIEW: This eBook outlines the benefits of IBM Security's MSSP Partner Program and explains how their threat detection and response solutions can help you capitalize on this unique market opportunity. Download now to learn how this program can help you scale your growth and increase your revenue potential.
Posted: 07 Jun 2019 | Published: 28 Feb 2019

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement