IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

IM Spam

RSS Feed   
IM Spam Reports
 
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

AI and Automation Address Cybersecurity Concerns
sponsored by TechData
CASE STUDY: As a school district sought to enable greater BYOD capabilities, expand remote learning, and better handle online lessons, they realized that they needed improved security capabilities. Examine this case study to see how Pearland was able to boost the security and speed of their services with the help of automation and more.
Posted: 15 Oct 2020 | Published: 17 Jan 2020

TechData

Keeping Tabs on a Constantly Evolving Threat Landscape
sponsored by Dell SecureWorks
WHITE PAPER: Criminal threat actors aren’t just developing their tactics and techniques – they’re updating their ‘business’ strategies, too. Cybercriminal operators are adopting strategies often seen in the legitimate business world to increase return on investment (ROI) and operational efficiency. Jump into this white paper to learn more.
Posted: 20 Oct 2020 | Published: 20 Oct 2020

Dell SecureWorks

Consumption-Based Infrastructure on Your Terms
sponsored by Datacentrix and HPE
PRODUCT OVERVIEW: Inside this white paper, learn how as-a-service capacity offerings can provide your enterprise the agility and economics of public cloud alongside the security of on-prem IT deployments—and with increased control over the entire environment.
Posted: 13 Oct 2020 | Published: 13 Oct 2020

Datacentrix and HPE

How Much is Too Much Cybersecurity Noise?
sponsored by Dell SecureWorks
WHITE PAPER: For security professionals, cybersecurity alert volume has gotten to the point where it’s almost too noisy to sift through – creating significant security challenges. So, what can security teams do to make sense of the noise? Read this white paper to find out.
Posted: 19 Oct 2020 | Published: 19 Oct 2020

Dell SecureWorks

Essentials of a Secured Work From Home Initiative
sponsored by McAfee
WEBCAST: Discover how MVISION Cloud can help keep your users secure while working from home.
Posted: 16 Oct 2020 | Premiered: Oct 16, 2020

TOPICS:  Security
McAfee

The Rise of APT as a Service
sponsored by Bitdefender
VIDEO: Access the Bitdefender investigation to learn the intricate details revealed into an APT attack, which targeted a company that deals with high-profile billion-dollar contracts in the real-estate industry.
Posted: 15 Oct 2020 | Premiered: 15 Oct 2020

Bitdefender

Endpoint Security: Protecting Your Business Wherever It Goes
sponsored by Dell SecureWorks
WHITE PAPER: The spread of COVID-19 forcing organizations to quickly shift towards working from home introduced a litany of new endpoint security risks while also amplifying existing ones. Read this white paper for a closer look at these challenges and best practices for addressing them.
Posted: 19 Oct 2020 | Published: 19 Oct 2020

Dell SecureWorks

Cloud Adoption and Risk Report
sponsored by McAfee
WHITE PAPER: The spread of COVID-19 has caused dramatic changes in how organizations approach protecting their remote employees while facilitating productive work environments – affecting cloud service usage across on a global scale. For key findings and statistics, read the McAfee Cloud Adoption and Risk Report.
Posted: 19 Oct 2020 | Published: 19 Oct 2020

McAfee

The 5 Phases of Incident Response
sponsored by BlackBerry
WHITE PAPER: According to an IBM study, the “vast majority” of organizations today are unprepared to respond effectively to a serious security incident. Most often, this is due to chronic resource issues and inadequate planning. Get in the know – read this white paper to learn the 5 phases of incident response and how to implement them.
Posted: 14 Oct 2020 | Published: 14 Oct 2020

BlackBerry
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info