IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Cellphone Spam

RSS Feed   
Cellphone Spam Reports
 
Wireless Protection for the Mobile Workforce
sponsored by AirDefense Inc.
WHITE PAPER: Growing threats could compromise wireless LAN devices at hotspots, airports, hotels and other public access networks. Learn how to enforce corporate policies & defend mobile clients from attacks that happen outside the secure enterprise per...
Posted: 26 Sep 2006 | Published: 01 Sep 2006

AirDefense Inc.

How To Plan A Successful Cloud Migration
sponsored by CloudHealth by VMware
WHITE PAPER: Access this paper to learn the challenges of migrating to the cloud successfully and how to meet those challenges head on.
Posted: 14 Dec 2018 | Published: 14 Dec 2018

TOPICS:  IT Management
CloudHealth by VMware

Inner Workings of Ransomware and Ways to Detect and Respond
sponsored by Arctic Wolf
VIDEO: Ransomware hacks can bypass your perimeter controls and infect your critical systems, brining your business to a halt. Unfortunately, focusing on prevention technologies, with point security products, may not be sufficient enough to fight these key security concerns. This webinar contains key insights on a ransomware cyber kill chain.
Posted: 07 Dec 2018 | Premieres: 31 Dec 2018

Arctic Wolf

Automating Detection and Response: A SANS Review of Swimlane
sponsored by Swimlane
ANALYST REPORT: In this product brief, learn about SOAR (Security Orchestration, Automation and Response) technology that offers integration and interoperability across security teams' tools that provides a centralized user interface for security analysts to alert on and triage tracking and case management.
Posted: 12 Dec 2018 | Published: 12 Dec 2018

Swimlane

CW Europe – December 2018
sponsored by ComputerWeekly.com
EZINE: Dutch military intelligence have released a lot of details about the attempted to hack into the networks of the Organisation for the Prohibition of Chemical Weapons (OPCW) in The Hague.
Posted: 06 Dec 2018 | Published: 13 Dec 2018

ComputerWeekly.com

UKtech50 2018: The 50 most influential people in UK IT
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, you will find our definitive list of the movers and shakers in UK IT – the CIOs, industry executives, public servants and business leaders driving the role of technology in the UK economy. This is our top 50 most influential people in UK IT for 2019.
Posted: 17 Dec 2018 | Published: 17 Dec 2018

ComputerWeekly.com

Security Automation Best Practices
sponsored by Rapid7
WHITE PAPER: While processes make it possible to get a job done faster, creating ones that solve practical problems and result in measureable efficiency gains can be a time-consuming task. In this white paper, learn how to make your security team successful with the help of automation.
Posted: 13 Dec 2018 | Published: 13 Dec 2018

Rapid7

Introducing the Future of Branch IT
sponsored by Cisco Systems, Inc.
WHITE PAPER: Discover how hyper-converged infrastructure and virtualization can work hand-in-hand to increase the performance, efficiency, and cost-effectiveness of branch IT environments – and without breaking the bank.
Posted: 07 Dec 2018 | Published: 07 Dec 2018

Cisco Systems, Inc.

Threat Intelligence Report
sponsored by F5 Networks
RESOURCE: How do you safeguard your employees from becoming phishing bait? In this report, learn why phishing campaigns work so well, how unsuspecting users play into the hands of attackers, and what your organization can do to avoid them.
Posted: 30 Nov 2018 | Published: 31 Dec 2017

F5 Networks

6 Critical Reasons for Office 365 Backup
sponsored by New Cloud Networks
WHITE PAPER: Click inside to find out the six vulnerabilities that hundreds of IT pros have identified in their own Office 365 environments – and how to patch any holes in your own instance.
Posted: 17 Dec 2018 | Published: 17 Dec 2018

New Cloud Networks
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement