IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Mobile Spam

RSS Feed   
Mobile Spam Reports
 
GDPR vs CCPA
sponsored by Auth0
EBOOK: Inside this guide to GDPR vs. CCPA, discover what businesses need to know to close compliance gaps between the two laws and how Auth0’s identity management platform can help.
Posted: 19 May 2020 | Published: 19 May 2020

Auth0

Vulnerability Remediation in Three Steps
sponsored by Vulcan
RESOURCE: As organizational environments become increasingly complex and security tools more disparate, the teams responsible for vulnerability remediation find themselves dealing with an overwhelming workload. In this article, discover 3 easy steps organizations can take to lower vulnerability risk and improving security posture.
Posted: 20 May 2020 | Published: 28 Nov 2019

Vulcan

Abusing code signing for profit
sponsored by Chronicle
WHITE PAPER: Cryptographically signing a piece of code is built on a problematic core tenet: Trust. This inherited trust model is taken advantage of by malware authors who purchase certificates directly or via resellers. Download this white paper to see what Chronicle researchers found when digging into this issue.
Posted: 21 May 2020 | Published: 21 May 2020

Chronicle

Providing Comprehensive Access Control & Data Security in Multi-Cloud Environments
sponsored by Okta + Netspoke
DATA SHEET: Today’s modern, flexible workforce requires a security strategy that is equally agile. For most organizations, identity management and access control is the answer. In this data sheet, take a closer look at a specific offering from Okta & Netskope, designed to meet security and productivity needs across multi-cloud environments.
Posted: 19 May 2020 | Published: 19 May 2020

Okta + Netspoke

Rightsizing Your SaaS Spend
sponsored by ClearEdge
WHITE PAPER: Sizing your SaaS deal incorrectly can cost you in the long run. In this white paper, learn how to dodge potential traps that lead to over- and under-buying, and how to apply deal sizing best practices to optimize your IT spend.
Posted: 28 May 2020 | Published: 28 May 2020

ClearEdge

ServiceNow Street Pricing & Sales Tactics
sponsored by ClearEdge
WHITE PAPER: Download this document to explore the actual discounts offered in more than 100 recent deals on ServiceNow's most popular suites. Learn how to avoid overpaying for products, ways to protect yourself from paying for the same functionality more than once, and how to leverage sales rep incentive plans for a better deal.
Posted: 28 May 2020 | Published: 28 May 2020

ClearEdge

The Sunshine Laws, Freedom of Information and Compliance
sponsored by Egress Software Technologies Inc
CASE STUDY: Learn how you can use Egress to minimize response time to information requests and avoid a costly violation.
Posted: 21 May 2020 | Published: 21 May 2020

Egress Software Technologies Inc

Top 10 Best Practices for Cloud Security Posture Management
sponsored by CloudHealth by VMware
WHITE PAPER: VMware interviewed several security experts and asked them how public cloud transformation has changed their cloud security and compliance responsibilities. Read about the top 10 best practices discovered during their research.
Posted: 27 May 2020 | Published: 27 May 2020

CloudHealth by VMware

Credential stuffing attacks: What they are and how to combat them
sponsored by Auth0
WHITE PAPER: Credential stuffing attacks are one of the most common types of large-scale cyberattacks today. In fact, 29% of data breaches in 2019 involved the use of stolen credentials. So how can you combat them? Download this white paper for everything you need to know.
Posted: 20 May 2020 | Published: 20 May 2020

Auth0

The Secure DevOps Imperative
sponsored by Trend Micro
VIDEO: In this webinar, join experts from ESG and Trend Micro as they discuss, the composition of cloud-native applications, the challenges that come with securing cloud-native environments and Secure DevOps best practices.
Posted: 28 May 2020 | Premiered: 28 May 2020

Trend Micro
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info