IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Instant Messaging Spam

RSS Feed   
Instant Messaging Spam Reports
 
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

CW Europe - June-August 2021: Amsterdam reins back datacentre developments over environmental concerns
sponsored by ComputerWeekly.com
EZINE: The construction of datacentres in the Netherlands' Amsterdam region has accelerated at such a pace that their demands for electricity are causing concern, prompting city authorities and datacentre operator to open a dialogue about sustainable datacentre industry expansion.
Posted: 26 May 2021 | Published: 10 Jun 2021

ComputerWeekly.com

Cybersecurity Infrastructure for the Future
sponsored by Verizon
RESOURCE: The rapid pivot to a remote workforce has refocused budgets, priorities and resources. Learn how businesses are addressing the increased attack surface and the amplified level of technical complexity required to keep organizations secure.
Posted: 12 May 2021 | Published: 12 May 2021

Verizon

The Observability Hierarchy Of Needs
sponsored by Cribl.io
WHITE PAPER: Implementing an observability pipeline gives enterprises access to their logs, metrics and traces, accelerating root cause analysis of performance challenges. Observing infrastructure, rather than just monitoring it, can improve customer satisfaction, increase revenue, and lower infrastructure costs. Open up this paper to learn more.
Posted: 11 May 2021 | Published: 11 May 2021

TOPICS:  IT Management
Cribl.io

5 ways to implement successful DevSecOps using IT automation
sponsored by Red Hat
EBOOK: PH
Posted: 24 Jun 2021 | Published: 24 Jun 2021

TOPICS:  IT Management
Red Hat

Malwarebytes Integration with Connect Wise Manage
sponsored by Malwarebytes
DATA SHEET: Open up this data sheet to take a look at one of Malwarebytes’ newest PSA tools – ConnectWise Manage – and uncover key capabilities, integration benefits, features, and more.
Posted: 24 Jun 2021 | Published: 24 Jun 2021

TOPICS:  Security
Malwarebytes

AWS Certified Security Specialty Exam Study Guide
sponsored by TechTarget
RESOURCE: Test your knowledge and find out everything you need to know about the AWS Certified Security Specialty exam in our exclusive new study guide.
Posted: 29 May 2021 | Published: 29 May 2021

TechTarget

Guide To Optimizing A Physical Security Operations Center
sponsored by Dataminr
EBOOK: To optimize a SOC’s performance, SOC managers must closely examine five major functions to identify ways to improve each individual function. Download the Guide to Optimizing a Physical Security Operations Center to learn more.
Posted: 28 May 2021 | Published: 28 May 2021

TOPICS:  Security
Dataminr

Simplify Your IT Transformation
sponsored by Micro Focus
PRODUCT OVERVIEW: Right now, the IT landscape is a complex hybrid of traditional and cloud-based technologies services – diverse, unpredictable, and constantly changing. This paper shows how your IT organization can reduce this complexity with IT automation platforms designed to simply your IT transformation. Jump in now to take a closer look.
Posted: 10 Jun 2021 | Published: 10 Jun 2021

TOPICS:  IT Management
Micro Focus

The CISOs Guide to Extending Zero Trust to the Endpoint
sponsored by Hysolate
WHITE PAPER: Zero trust is a holistic approach to network security, requiring the verification of each person and device whenever it attempts to access resources on a private network, regardless of whether they are already inside the perimeter. Open up this paper to explore everything you need to know about zero trust for your organization.
Posted: 23 Jun 2021 | Published: 23 Jun 2021

TOPICS:  Security
Hysolate
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences