IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Instant Messaging Spam

RSS Feed   
Instant Messaging Spam Reports
 
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

Securing the Remote Revolution
sponsored by AWS & CrowdStrike
EBOOK: Protecting modern remote workforces requires security capabilities that go beyond traditional approaches. This e-book provides an overview of the emerging adversary tactics targeting remote workforces and highlights new and effective cybersecurity strategies for a fully remote world – read on to get started.
Posted: 21 Sep 2020 | Published: 21 Sep 2020

AWS & CrowdStrike

The Evolution of Application Fraud
sponsored by F5 Networks
RESOURCE: Cyberattacks targeting business applications have been on the rise in recent years – an issue made exponentially more prominent as web applications grew in popularity due to COVID-19 changes. This resource provides an overview of the evolution of application fraud – read on to get started.
Posted: 18 Sep 2020 | Published: 18 Sep 2020

F5 Networks

2020 Application Security Observability Report
sponsored by Contrast Security
WHITE PAPER: Nearly 96% of applications contain at least one vulnerability, yet only 26% have a serious vulnerability – modern vulnerability management, especially when it comes to applications – is about effectively prioritization. For more findings and guidance for building an application security strategy, read this research report.
Posted: 21 Sep 2020 | Published: 13 Jul 2020

Contrast Security

Introducing Cortex XSOAR
sponsored by Palo Alto Networks
VIDEO: Security orchestration, automation and response (SOAR) has become key to effective security strategies. But, like any cybersecurity technology, yesterday’s SOAR capabilities have evolved to reflect the needs of today’s organizations. Watch this webinar to learn more about Palo Alto’s Cortex XSOAR and see how it compares to traditional SOAR.
Posted: 28 Sep 2020 | Premiered: 28 Sep 2020

Palo Alto Networks

Expert Advice to Enable Remote IT Access
sponsored by Vertiv
VIDEO: In this webinar, Vertiv experts will discuss how to prepare for business continuity when physical access to critical resources is restricted and how to allow access to IT infrastructure from anywhere at any time.
Posted: 29 Sep 2020 | Premiered: 29 Sep 2020

Vertiv

Automated Breach and Attack Simulation Webcast
sponsored by XM Cyber
WEBCAST: View this Frost & Sullivan webinar to learn about the benefits an automated breach and attack simulation.
Posted: 23 Sep 2020 | Premiered: Sep 23, 2020

XM Cyber

BotRx ProTx Mobile Application Security
sponsored by BotRX
DATA SHEET: Mobile applications have emerged as one of the most lucrative threat vectors for a cybercriminal interested in orchestrating a malicious bot attack. In order to protect your organization’s mobile app and subsequent data, security tactics need to be dynamic. Read this data sheet to learn how BotRx protects web and mobile apps against bot attacks.
Posted: 28 Sep 2020 | Published: 28 Sep 2020

BotRX

How to Spot a Spear Phishing Email
sponsored by Vade Secure
RESOURCE: The personal nature of spear phishing emails can often make them hard to spot – especially when the sender adopts the persona of a trusted friend or colleague. To help you better spot these attempts, this resource highlights 5 details to look for to determine if an email is spear phishing or legitimate.
Posted: 18 Sep 2020 | Published: 18 Sep 2020


Your Monitoring Tool has Superpowers
sponsored by Centreon Software Systems
WHITE PAPER: Dive inside this white paper to learn about “smart monitoring” platforms, boasting end-to-end monitoring coupled with agile and standardized capabilities, and the role they play in a modern ITOps strategy.
Posted: 22 Sep 2020 | Published: 22 Sep 2020

Centreon Software Systems
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info