IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Mobile Phone Spam

RSS Feed   
Mobile Phone Spam Reports
 
Email security: Never more important
sponsored by ComputerWeekly.com
EBOOK: In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

ComputerWeekly.com

Remove Standing Privileges Through a Just-in-Time PAM Approach
sponsored by Centrify Corporation
ANALYST REPORT: Privileged access carries significant risk, and even with PAM tools in place, the residual risk of users with standing privileges remains high. Security and risk management leaders must implement a zero standing privileges strategy through a just-in-time model. Download this report to learn how effective PAM requires enforcing least privilege.
Posted: 10 Feb 2020 | Published: 10 Feb 2020

Centrify Corporation

The Data Leader's Guide to Enterprise Cloud Security and Data Architecture
sponsored by Matillion
EBOOK: Organizations are continuing to adopt cloud computing as a core part of their infrastructure, allowing for lower costs and improved scalability. However, there are some enduring security concerns surrounding cloud. This e-book highlights these concerns, and overviews ways to implement security controls within a cloud environment.
Posted: 13 Feb 2020 | Published: 16 Aug 2019

Matillion

Network Security Management for IT and Industrial Networks
sponsored by Beta Systems
WHITE PAPER: Auconet Business Infrastructure Control Solution (BICS) for IT Security and its counterpart, BICS for Industrial Security, can help overcome key challenges of securing complex IT and industrial control networks. In this white paper, learn more about the security capabilities and features of Auconet BICS for IT and industrial control networks.
Posted: 10 Feb 2020 | Published: 10 Feb 2020

Beta Systems

Digital Workplace Transformation Part Four: Technology
sponsored by Ricoh
VIDEO: In the fourth and final installment of this video series from ComputerWeekly, hear a collection of industry experts discuss the technology challenges and opportunities that digital workplace transformation presents, and how to assemble a technology strategy that works for your own organization.
Posted: 12 Feb 2020 | Premiered: 12 Feb 2020

Ricoh

Digital Workplace Transformation Part Three: Process
sponsored by Ricoh
VIDEO: In the third installment of this video series from ComputerWeekly, hear a collection of industry experts discuss the organizational and business-level challenges of digital workplace transformation – and the strategies they prescribe to counter them.
Posted: 12 Feb 2020 | Premiered: 12 Feb 2020

Ricoh

Core - DNS - Network Security for SD-WAN
sponsored by Cisco Umbrella
WHITE PAPER: According to a 2019 study, 68% of security breaches involved branch offices and roaming users as the source of compromise. Download this white paper to find out how to deliver network security for today's evolving WAN networks and protect remote and roaming users.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

Cisco Umbrella

Bovis Homes
sponsored by Absolute Software Corporation
CASE STUDY: In this case study, follow the journey of Bovis Homes, a residential development company in the UK, as they partner with Absolute Software to establish visibility and control over their disparate mobile endpoints to ensure security and meet GDPR compliance.
Posted: 10 Feb 2020 | Published: 25 Jun 2019

Absolute Software Corporation

All Clouds Are Not Equal
sponsored by Forcepoint
EBOOK: When it comes to cloud security, there are a good deal of misconceptions that persist.In fact, security concerns are usually the main reason why an organization stays away from cloud. In this e-book, debunk the 5 most common cloud security misconceptions and learn what to look for in a cloud-based security solution.
Posted: 06 Feb 2020 | Published: 06 Feb 2020

Forcepoint

How Phishing Security Software is Different from Email Security Software
sponsored by Inky Technology
RESOURCE: All legacy email security apps on the market have value and are useful within the space that they operate. However, there are many differences between traditional email security software and anti-phishing software platforms. Read on to learn more.
Posted: 10 Feb 2020 | Published: 10 Feb 2020

Inky Technology
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info