IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Instant Messaging Spam

RSS Feed   
Instant Messaging Spam Reports
 
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Online Identity Information for Professionals
sponsored by Pipl
DATA SHEET: Microsoft, IBM, Twitter, BBC, eBay are among the industry leaders that use Pipl in their identity information investigations – but why? This Pipl data sheet provides an overview of Pipl’s mission, key features, strategic capabilities, and more. Read on to unlock the full data sheet.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

Pipl

Keeping Remote Workers Safe and Your Work Secure
sponsored by Forcepoint
VIDEO: As organizations continue to enable their remote workers, ensuring their security (without sacrificing productivity) becomes a critical practice. Watch this webinar for 6 remote worker security best practices from top security strategists
Posted: 12 Jan 2021 | Premiered: 12 Jan 2021

Forcepoint

ID+: A Predictive Analytics Platform for Identity Verification
sponsored by Socure
DATA SHEET: In this data sheet, take a closer look at the top 4 challenges organizations are facing when it comes to identity verification, and discover how ID+, a predictive analytics platform for identity verification, is positioned to help organizations address these issues – read on to learn more about the platform.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

Socure

Seamlessly Scale Security on AWS with Fortinet
sponsored by Fortinet, Inc.
VIDEO: While cloud is at the foundation of modern innovation, it has the potential to introduce a new array of risks and threats to organizations that aren’t prepared. Watch this webinar – which features security leaders at Fortinet and AWS – to unlock best practices, expert insights, and more.
Posted: 19 Jan 2021 | Premiered: 19 Jan 2021

Fortinet, Inc.

Inky 2020 End of Year Phishing Report
sponsored by Inky Technology
RESEARCH CONTENT: With most people working remote in 2020, reliance on email for communication grew even higher – leading to a stark rise in phishing attacks. This report reflects on the top threat types and security strategies for phishing in 2020 and offers insight into what to expect in 2021 – read on to unlock the full report.
Posted: 20 Jan 2021 | Published: 20 Jan 2021

Inky Technology

Cover Your Bases: Best Practices for Protecting Remote Work
sponsored by Okta
EBOOK: You have a network to protect, and this means not compromising when it comes to access management, authentication, onboarding and training. In a remote world, you need contextualized, cloud-first identity control that’s flexible, so you can handle all this and more, no problem. Download this Okta best practice guide for details.
Posted: 19 Jan 2021 | Published: 19 Jan 2021

Okta

Sigma Synthetic Fraud
sponsored by Socure
DATA SHEET: Synthetic identity fraud is continuing to emerge as the next generation of digital fraud and financial theft. The following data sheet provides a closer look at what this threat entails, why it’s been growing and how to best address it – read on to get started.
Posted: 11 Jan 2021 | Published: 11 Jan 2021

Socure

Get a Head Start on Your Application Security Program with Open Source Tools
sponsored by ZeroNorth
WHITE PAPER: In today’s volatile threat landscape and economy, no company can afford to release vulnerable software. Businesses should leverage existing resources—such as open source tools—to create a strategic, comprehensive application security program. Find out how to get a head start on your application security program using open source code in this guide.
Posted: 12 Jan 2021 | Published: 12 Jan 2021

ZeroNorth

2021 IT Priorities: APAC Key Technology Areas Infographic
sponsored by ComputerWeekly.com
EGUIDE: This year, we asked nearly 300 IT professionals in APAC which technology areas they identified as being imperative for 2021. In this infographic find out how remote working is influencing investments, learn about shifts in application development trends and which infrastructure tools will be deployed most in 2021.
Posted: 13 Jan 2021 | Published: 13 Jan 2021

ComputerWeekly.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info