IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cellphone Spam

RSS Feed   
Cellphone Spam Reports
 
The Top 7 Phone Verification Challenges & How to Overcome Them
sponsored by Vonage
WHITE PAPER: No consumer wants to be the victim of fraud or the recipient of unwelcome spam, and no app or service provider wants to unwittingly harbor spammers or fraudsters. In this e-book, learn how to increase conversion rates and onboard users at global scale with phone verification.
Posted: 24 Mar 2020 | Published: 24 Mar 2020

Vonage

Alero Demo
sponsored by CyberArk Software, Inc
VIDEO: As businesses continue to enable third parties with access to their networks, they should be mindful of the security vulnerabilities they risk exposing their sensitive data to. This short video provides a demo of CyberArk Alero, showcasing the ease of use and some key features. Watch now to learn more.
Posted: 24 Mar 2020 | Premiered: 24 Mar 2020

CyberArk Software, Inc

Your Path to a Mature AppSec Program
sponsored by Veracode, Inc.
WHITE PAPER: Although applications are critical to how businesses operate, web apps are among the top risk areas that hackers attempt to expose. In fact, nearly 40% of global data breaches originate at the application-layer. In this guide, discover what effective application security looks like and learn the steps you can take to reach app sec maturity.
Posted: 01 Apr 2020 | Published: 01 Apr 2020

Veracode, Inc.

Rethinking API Security
sponsored by Okta
VIDEO: APIs enable organizations with new avenues for enhancing business operations and customer experiences. In this session, we’ll cover the foundations of developing, securing, and managing access to the critical APIs that drive our business.
Posted: 26 Mar 2020 | Premiered: 26 Mar 2020

Okta

Key Considerations to Supporting Work-at-Home Directives for Business Continuity
sponsored by VMware
WHITE PAPER: In today’s world, business continuity measures are centered around enabling work from home capabilities to protect against productivity losses. Dive inside this guide to learn about the five principles responsible for driving a digitally-savvy employee experience – even if employees are clocking in from home.
Posted: 02 Apr 2020 | Published: 31 Mar 2020

VMware

State of Software Security: Executive Summary
sponsored by Veracode, Inc.
RESEARCH CONTENT: The 2019 Veracode State of Software Security represents the 10th version of the report. Gain insight into the high-level application security trends Veracode identified this year in this executive summary of their report.
Posted: 31 Mar 2020 | Published: 31 Mar 2020

Veracode, Inc.

7 Steps to SSO + MFA to On-Prem Apps
sponsored by Okta
WEBCAST: Learn how to use Okta Access Gateway to control access to Hybrid IT and on-prem web applications, all without changing how your on-prem web apps work today.
Posted: 25 Mar 2020 | Premiered: Mar 25, 2020

Okta

Veracode Integrations
sponsored by Veracode, Inc.
EBOOK: To keep up with the shift to DevOps and rapid release cycles, application security solutions need to integrate into security and development teams’ existing tools and processes. Learn how the Veracode Application Security Platform integrates with the development, security and risk-tracking tools you may already be using.
Posted: 02 Apr 2020 | Published: 02 Apr 2020

Veracode, Inc.

Customer Identity & Access Management (CIAM)
sponsored by Ping Identity Corporation
WHITE PAPER: Customer identity and access management (CIAM) has risen in popularity, allowing organizations to enhance customer engagement while ensuring security. This buyer’s guide is designed to provide you with the knowledge needed to understand what to look for in an effective CIAM tool. Read on to learn more.
Posted: 25 Mar 2020 | Published: 25 Mar 2020

Ping Identity Corporation

Alero Intro
sponsored by CyberArk Software, Inc
VIDEO: In this short video, take a high-level look at some of the key features and capabilities of CyberArk Alero, which enables IT security teams to grant remote access to third parties – without the need for VPNs, passwords or agent. Watch now to learn more.
Posted: 25 Mar 2020 | Premiered: 25 Mar 2020

CyberArk Software, Inc
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info