IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Mobile Phone Spam

RSS Feed   
Mobile Phone Spam Reports
Evaluating and Measuring DDoS Risk During the COVID-19 Era
sponsored by Akamai Technologies
WEBCAST: Distributed denial-of-service (DDoS) attacks range from small and sophisticated to large and bandwidth-busting. Unplanned outages are costly, requiring fast and effective DDoS mitigation. Join Dennis Birchard, Akamai’s Lead Principal Cloud Security Architect, to learn about DDoS trends, mitigation strategies and more.
Posted: 25 Nov 2020 | Premiered: Nov 25, 2020

Akamai Technologies

Cyber Resilience as a Competitive Advantage
sponsored by Comcast Business
RESOURCE: Now more than ever, customers are attuned to the impact of security threats to their own data. As a result, having strong cyber resilience may grant your organization an unexpected competitive advantage. Read this article to learn 6 cybersecurity best practices that will build your resilience in a way that can help you stand out from the crowd.
Posted: 24 Nov 2020 | Published: 08 Oct 2020

Comcast Business

Insider Threat Protection for the Modern Enterprise
sponsored by Dtex
DATA SHEET: Legacy insider threat platforms typically rely on ‘person of interest’ identification and require time-consuming, full-time analyst interaction. This approach can create high levels of false positives and require heavy endpoint agents that degrade performance.Learn about a different approach: Insider Threat Protection with DTEX InTERCEPT.
Posted: 24 Nov 2020 | Published: 24 Nov 2020


Protect Against Evolving Data Security Threats
sponsored by Fasoo
EGUIDE: Today’s cyberthreats pose significant risk to an organization’s sensitive or confidential data. The following e-guide explores the most dangerous threat types and tactics facing organizations today and the steps you can take to protect your data – read on to unlock the full guide.
Posted: 24 Nov 2020 | Published: 23 Nov 2020


The Benefits of Splunk For Security Operations
sponsored by Splunk
ANALYST REPORT: Splunk Enterprise Security (ES) and Splunk User Behavior Analytics (UBA) enable IT and security operations centers to identify, analyze, and mitigate advanced cyberthreats. Forrester interviewed several customers with experience using Splunk’s security solutions. Download the report to evaluate the potential financial impact of Splunk ES & UBA.
Posted: 20 Nov 2020 | Published: 20 Nov 2020


Remote Workforce Security Report 2021
sponsored by Dtex
RESEARCH CONTENT: Securing the remote workforce has become a critical priority for organizations affected by the closing of offices and workplaces in the wake of the ongoing COVID-19 pandemic. Download this Remote Workforce Security Report to learn more about how you can protect your organization against evolving threats and during challenging times.
Posted: 24 Nov 2020 | Published: 24 Nov 2020


Next Generation Endpoint Protection
sponsored by Claranet
WHITE PAPER: Traditional cybersecurity is no match for today’s endpoint security threats – so does that mean antivirus (AV) is dead? This buyer’s guide provides an overview of why traditional tactics – like AV – aren’t working, a new approach to endpoint security, and an evaluation of next-generation endpoint protection vendors – read on to get started.
Posted: 23 Nov 2020 | Published: 23 Nov 2020


How Financial Services Can Achieve and Manage Continuous Security and Compliance in a Public Cloud
sponsored by IBM
WHITE PAPER: The financial services industry is perhaps the most highly regulated in the world. In the U.S., banks must comply with at least 10 major regulations at the federal level alone. So how, then, are financial services firms to migrate to the cloud in a secure and compliant manner? Read this IBM white paper to see some suggestions.
Posted: 23 Nov 2020 | Published: 23 Nov 2020


Discover How to Remove Security Barriers and Experience the Benefits of Azure
sponsored by Barracuda
WEBCAST: Digital transformation is well underway, requiring profound changes—and bringing a host of new benefits. As you prepare your organization to begin or advance its migration to Azure, you want up-to-date, actionable info about best practices in the cloud—including security. Watch this webcast to become more informed on these practices.
Posted: 20 Nov 2020 | Premiered: Apr 2, 2020


Reduce API Security Risks with Automated and Continuous API Scanning
sponsored by WhiteHat Security
WEBCAST: Digital businesses have widespread API usage, making it easier for organizations to share data and integrate with customer applications. However, APIs have increasingly become a target for attackers, leading to many serious data breaches in recent history. How do we reduce API security risks? View this webcast to learn why testing may be the key.
Posted: 20 Nov 2020 | Premiered: Jul 15, 2020

WhiteHat Security

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.


All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info