IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cell Phone Spam

RSS Feed   
Cell Phone Spam Reports
 
Patch Management: Your Biggest Ally in the War Against Cybercrime
sponsored by Panda Security
WHITE PAPER: The majority of attacks and exploits today take advantage of outdated systems and third-party applications, exploiting known vulnerabilities. In this white paper, learn about the dangers of vulnerabilities, including the new BlueKeep vulnerability, and ways you can keep your organization safe.
Posted: 10 Oct 2019 | Published: 10 Oct 2019

Panda Security

Understanding the Mobile Threat Landscape
sponsored by IBM
ANALYST REPORT: With more web traffic now taking place on mobile than desktop, scammers are taking note by hitting victims with regular device-centric scams that leverage popular apps. In this report, explore the key mobile security trends that emerged last year. Also, uncover predictions for the mobile threat landscape in the years ahead.
Posted: 17 Oct 2019 | Published: 17 Oct 2019

IBM

Sharpen your Focus on Spear Phishing Attacks in 2019
sponsored by PortSys
RESOURCE: How can you ensure you don’t end up being skewered by a spear phishing attack? Stronger identity management with multiple factors of authentication? Biometrics? How about Context of Access? Find out the facts in this revealing overview from security pundit Michael Oldham, CEO of PortSys.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

PortSys

Security for Microservices: Best Practices
sponsored by Aporeto
WHITE PAPER: Moving to a microservices framework and adoption of cloud-native services introduces new security considerations for developers, line-of-business owners, and security teams. In this white paper, explore best practices for security in a microservices environment.
Posted: 18 Oct 2019 | Published: 18 Oct 2019

Aporeto

Evaluating Vulnerability Risk Management Providers
sponsored by Rapid7
ANALYST REPORT: As vulnerability risk management evolves to address customers’ needs, this Forrester Wave seeks to highlight solutions that help customers prioritize remediation efforts. In the report, explore an evaluation of 13 vulnerability risk management providers.
Posted: 22 Oct 2019 | Published: 17 Oct 2019

Rapid7

Securing Cloud-Native Kubernetes Applications
sponsored by Radware
WHITE PAPER: When businesses look to optimize and accelerate application development life cycles and deliver their applications in public clouds, security becomes a greater challenge. In this white paper, learn how to ensure the timely development and deployment of secure applications across hybrid computing environments.
Posted: 23 Oct 2019 | Published: 23 Oct 2019

Radware

3 Essential Components of a Managed Security Service for SMBs
sponsored by Avast Software
WHITE PAPER: This white paper examines the current attack surface for SMBs and looks at the 3 essential components of a managed security service, which include protection for data, devices, and people. Read on to learn more.
Posted: 10 Oct 2019 | Published: 10 Oct 2019

Avast Software

How Machine Learning Can Help You Keep up with Current Threats
sponsored by Appian
WHITE PAPER: Can AI and machine learning (ML) systems actually help solve IT security problems and protect against threats moving forward? Download this e-guide for more expert insights into the potential AI and ML can bring to your organization’s proactive security measures.
Posted: 16 Oct 2019 | Published: 16 Oct 2019

Appian

Attackers are Targeting your Company’s Most Valuable Resource: Your People
sponsored by Proofpoint
EBOOK: Gaining true visibility into the state of cyber-risk requires organizations to address the need to protect people against attacks at 3 different levels. And when we say “people” we’re not just talking about senior execs/the c-suite. Download and discover how to more effectively address 3 major problem areas in today’s enterprise.
Posted: 18 Oct 2019 | Published: 18 Oct 2019

Proofpoint

Assessing the Security and Compliance Posture of an AWS Account and Its Assets
sponsored by CloudPassage
VIDEO: CloudPassage Halo is a cloud security platform for severless, server-based and containerized assets in public and hybrid cloud environments. In this video, watch a demo of how Halo Cloud Secure can assess the security and compliance posture of an AWS account and the assets it contains.
Posted: 10 Oct 2019 | Premiered: 10 Oct 2019

CloudPassage
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement