IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Mobile Phone Spam

RSS Feed   
Mobile Phone Spam Reports
 
Measuring and Improving Cyber Defense Using the MITRE ATT&CK Framework
sponsored by ThreatQuotient
WHITE PAPER: For the past 5 years, the MITRE ATT&CK project has grown into a cybersecurity staple – organizations and their security teams are adopting ATT&CK frameworks with blinding speed (and for good reason). Read this SANS paper to learn more about MITRE ATT&CK and discover why its popularity has skyrocketed.
Posted: 18 Sep 2020 | Published: 31 Jul 2020

ThreatQuotient

The Importance of Identity in Securing Your Business
sponsored by Okta
VIDEO: Identity management plays a critical role in an organization’s ability to secure an increasingly distributed workforce. This video underlines the importance of identity management for securing your business – particularly as it relates to the current pandemic and getting adjusted to the ‘new normal’.
Posted: 17 Sep 2020 | Premiered: 17 Sep 2020

Okta

The Hacker Infrastructure and Underground Hosting
sponsored by Trend Micro
RESOURCE: How are criminals able to host service and infrastructure on the internet without a takedown or an arrest? What makes them hard to track down? Read this research paper to learn how criminal forums have evolved to adapt to the demands of the underground market and the ways they have enabled easier access to underground hosting.
Posted: 11 Sep 2020 | Published: 11 Sep 2020

Trend Micro

Credential Stuffing 2020: Attack Tools and Trends
sponsored by F5 Networks
VIDEO: Recently emerging as one of the most prominent threats targeting web applications, credential stuffing has found its way into news headlines and mainstream media. This webinar provides an overview of the current credential stuffing trends and tactics – highlighting how the threat has evolved over the years.
Posted: 18 Sep 2020 | Premiered: 18 Sep 2020

F5 Networks

Phishing Attacks Advanced Techniques That Evade Detection
sponsored by Vade Secure
WHITE PAPER: The advancement of the phishing attack has left organizations looking for ways to identify the growing number of unique phishing URLs sent to their email servers. From spoofing addresses to exploiting credentials, these attacks grow more complex yearly. Don’t get left behind – read this comprehensive guide on phishing.
Posted: 22 Sep 2020 | Published: 22 Sep 2020


2020 SANS Cyber Threat Intelligence (CTI) Survey
sponsored by ThreatQuotient
WHITE PAPER: In order to understand the risks that threaten their sensitive data, organizations are embracing cyber threat intelligence (CTI) programs. But how effective are current CTI programs? This research report provides a comprehensive look at the results of the 2020 SANS Cyber Threat Intelligence (CTI) Survey – read on to get started.
Posted: 17 Sep 2020 | Published: 29 Feb 2020

ThreatQuotient

Taking Good Care of Data at Rush Memorial Hospital
sponsored by Clumio
EBOOK: As enterprises move aggressively to cloud, they use Clumio to protect workloads like VMware Cloud on AWS and native AWS services. Born in the public cloud, Clumio can leverage the most modern cloud services to ensure it meets the current and future backup requirements of the most demanding enterprises.
Posted: 11 Sep 2020 | Published: 11 Sep 2020

Clumio

Executive Summary 2020 Thales Data Threat Report
sponsored by Thales
ANALYST REPORT: Threat intelligence and information has never been more valuable to businesses. As such, an IDC survey commissioned by Thales found that 45% of respondents felt that their organizations would exceed their original 2020 security budgets. In APAC, the time for action is now. Read the full threat report to see how attitudes are changing.
Posted: 24 Sep 2020 | Published: 24 Sep 2020

Thales

Advances in Technology Make Virtual Health a Reality
sponsored by Comcast Business
WHITE PAPER: Virtual health, otherwise known as telehealth, has gained popularity over the last few years. More than video chat with a physician, it has emerged as an extension of, and possibly a replacement for, in-person health services. But the technology behind it must live up to expectation. Read this white paper to learn 4 challenges of virtual health.
Posted: 11 Sep 2020 | Published: 11 Sep 2020

Comcast Business

Stay Afloat Using AWS Security Hub And Splunk To Find, Fix, And Prevent Security Leaks
sponsored by AWS-Splunk
EBOOK: With Splunk Phantom and Splunk Enterprise integrations to AWS Security Hub, you can further accelerate detection, investigation and response to potential threats within your security environment. Download this e-book to find secure footing using Splunk with AWS Security Hub.
Posted: 22 Sep 2020 | Published: 22 Sep 2020

AWS-Splunk
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info