IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

IM Spam

RSS Feed   
IM Spam Reports
 
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Protecting Intellectual Property: Black, White, and Shades of Gray
sponsored by InteliSecure
WHITE PAPER: Complying with data privacy regulations is important, but rarely is regulated data the only data worth protecting. Losses associated with regulatory fines present far less risk than the potential losses associated with intellectual property theft. In this white paper, learn how a data protection program can help you protect even unstructured IP.
Posted: 21 Jan 2020 | Published: 21 Jan 2020

InteliSecure

Your Email Security is Ineffective, and Getting Worse
sponsored by Ironscales
WHITE PAPER: The impacts of phishing attacks continue to expose the gaps in current email security tactics and highlights why organizations need to adapt their existing approach to meet the requirements of modern threats. Read on to uncover the key data insights from this Aberdeen study into the email security landscape.
Posted: 14 Jan 2020 | Published: 30 Jun 2019

Ironscales

Webinar: You Need Live Patching to Achieve SOC2 Compliance
sponsored by CloudLinux
VIDEO: In this webinar, join industry experts as they share best practices and use cases of data protection and vulnerability management for maintaining compliance in their Linux-based systems. Continue to view the webinar.
Posted: 24 Jan 2020 | Premiered: 11 Jul 2019


Onboarding IT Service Providers Shouldn’t be Complicated, Costly, or Risky
sponsored by Tehama
WHITE PAPER: Enterprises need to secure, accelerate, and simplify how they onboard external third parties and provide access to critical and vulnerable systems while mitigating the cybersecurity risks. This white paper goes in-depth into the associated risks and outlines potential tactics for ensuring security during the onboarding process.
Posted: 20 Jan 2020 | Published: 31 Jan 2019

Tehama

New Topics on the New Security+ SY0-501 Exam
sponsored by Global Knowledge
WHITE PAPER: In 2017, the revised version of the CompTIA Security+ exam was made available, with more focus on risk management and mitigation. This white paper will guide you in your efforts to prepare for the exam by outlining the new topics included in the objectives list for the current version of the exam.
Posted: 16 Jan 2020 | Published: 16 Jan 2020

Global Knowledge

AIOps Gets Real: 5 Proven Business Cases for Success
sponsored by Moogsoft
CASE STUDY: Like any technology bundled with artificial intelligence and machine learning capabilities, a lot of the facts about AIOps can get lost amidst heavy marketing noise.Cut through the noise by reading over five real world examples of successful AIOps adoption in organizations just like yours.
Posted: 17 Jan 2020 | Published: 17 Jan 2020

Moogsoft

Preparing for launch: Essential elements for a successful digital transformation
sponsored by ServiceNow
WHITE PAPER: Organizations should shift their focus away from legacy systems and devote more time to streamlining and future-proofing their operations. This eBook explores exactly how IT organizations should prepare for a digital transformation, and what elements are required for that transition to be successful. Read the guide here to see the details.
Posted: 24 Jan 2020 | Published: 24 Jan 2020

ServiceNow

CIO Trends #10: Benelux
sponsored by ComputerWeekly.com
EGUIDE: If CIOs ever needed a reminder of the predatory cyber criminals that circle their organisations, Travelex's woes is a big one. Also find out how close autonomous ships are to regularly docking in Dutch ports. Read more about it in this issue of our CIO Trends Benelux series.
Posted: 16 Jan 2020 | Published: 16 Jan 2020

ComputerWeekly.com

Implementing Effective Cyberprotection Demands New Approaches
sponsored by NWN Corporation
WHITE PAPER: As cyberattackers become more skilled and launch harder-to-detect campaigns, organizations need to revise their security strategies to match the pace of modern attacks. Use this white paper to explore the 7 essential services that your chosen partner provides should include.
Posted: 23 Jan 2020 | Published: 23 Jan 2020

NWN Corporation
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info