IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Mobile Phone Spam

RSS Feed   
Mobile Phone Spam Reports
 
Protect Against Phishing with Microsoft Exchange and ServiceNow
sponsored by ServiceNow
RESOURCE: With the widespread use of phishing as a method of attack, SOC teams struggle to identify true phishing emails that have slipped through to users’ mailboxes and contain the threats they create. In this solution brief, discover how to protect against phishing with Microsoft Exchange and ServiceNow.
Posted: 23 Oct 2019 | Published: 23 Oct 2019

ServiceNow

Weighing the Risks: The Real Costs of a Data Breach
sponsored by Citrix
RESOURCE: Work has moved beyond office walls, and attackers are adapting. Defending against the attacks of today with yesterday’s tools and techniques can’t keep your systems and data secure. Download this infographic to learn how you can reduce risk and boost productivity with Citrix Workspace.
Posted: 17 Oct 2019 | Published: 17 Oct 2019

Citrix

Network Security for a New Era
sponsored by TechData - HPE
WHITE PAPER: Mobile devices and smart objects are connecting to the same school networks, but they have very different security needs. Read this report for how K-12 leaders can manage the new security challenges of mobile devices and smart objects.
Posted: 21 Oct 2019 | Published: 21 Oct 2019

TechData - HPE

Web App Firewall Webinar
sponsored by Tala Security
VIDEO: In the past couple of years, organizations have seen a spike in attacks that are focused on getting malicious crypto into the browser in order to exfiltrate data. In this video, Aanand Krishnan from Tala Security discusses how your organization is exposed to web application attacks on the browser side and how to protect your organization.
Posted: 16 Oct 2019 | Premiered: 16 Oct 2019

Tala Security

Think your Business is Too Small to be at Risk of a Security Breach? Think Again.
sponsored by PortSys
RESOURCE: Find out how SMBs on a budget can encrypt data and more effectively control access to it without having to decimate their IT budget to do so.
Posted: 16 Oct 2019 | Published: 16 Oct 2019

PortSys

Securing Cloud-Native Kubernetes Applications
sponsored by Radware
WHITE PAPER: When businesses look to optimize and accelerate application development life cycles and deliver their applications in public clouds, security becomes a greater challenge. In this white paper, learn how to ensure the timely development and deployment of secure applications across hybrid computing environments.
Posted: 23 Oct 2019 | Published: 23 Oct 2019

Radware

Onward to the Future of IT Support
sponsored by LogMeIn RescueAssist
WHITE PAPER: In this Aberdeen report, take a look at how new technologies and evolving end-user expectations are transforming IT support.
Posted: 16 Oct 2019 | Published: 16 Oct 2019

LogMeIn RescueAssist

Who Owns Cloud Security?
sponsored by OneNeck IT
WHITE PAPER: As cybersecurity risks become more numerous, sophisticated and expensive, businesses are scrambling to fortify their defenses and running into an important question: Who actually owns cloud security? Download this white paper to find out.
Posted: 22 Oct 2019 | Published: 22 Oct 2019

OneNeck IT

Hacker-Powered Data - Security Weaknesses and Embracing Risk with HackerOne
sponsored by HackerOne
WEBCAST: Today, companies, enterprises, & governments are embracing collaboration with hackers to find vulnerabilities before criminals have a chance to exploit them. In this webcast, Miju Han from HackerOne discusses the most common vulnerabilities not found on the OWASP top 10.
Posted: 17 Oct 2019 | Premiered: Oct 17, 2019

HackerOne

Modernizing Data Protection
sponsored by Forcepoint
WEBCAST: Navigating your data protection journey can be complex. It requires you to keep up with the latest regulations and protect intellectual property – all while adapting to evolving IT environments. In this webcast, Angelica Torres-Corral discusses how to gain visibility and control of your data, optimize a DLP solution, and more.
Posted: 10 Oct 2019 | Premiered: Oct 10, 2019

Forcepoint
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement