IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Mobile Spam

RSS Feed   
Mobile Spam Reports
 
2019 LexisNexis True Cost of Fraud Study
sponsored by LexisNexis® Risk Solutions
WEBCAST: A recent study by LexisNexis Risk Solutions was conducted to help safely navigate the increasing risk of fraud. The research was able to provide a snapshot of current fraud trends and key pain points among financial services and lending companies in the US. Continue to this webcast to uncover the insights from the research.
Posted: 27 Nov 2019 | Premiered: Nov 27, 2019

LexisNexis® Risk Solutions

CW Europe December 2019: Deutsche Bank creates innovation division
sponsored by ComputerWeekly.com
EZINE: German investment banking giant Deutsche Bank is opening a division focused on innovation as part of its plan to digitise all business operations. Read more details in this edition of CW Europe.
Posted: 03 Dec 2019 | Published: 12 Dec 2019

ComputerWeekly.com

The New Era of Fraud: A Bot-Driven Threat
sponsored by F5 Networks
WHITE PAPER: With most attacks happening at the app level, protecting the capabilities that drive your business means protecting the apps that make them happen. This article highlights the many faces of fraud and some of the common tactics used to detect and prevent attacks. Read on to learn more.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

F5 Networks

Splunk IT Security Predictions 2020
sponsored by Splunk
WHITE PAPER: Technology continues to redesign every aspect of how we live and work. It also creates new security vulnerabilities that savvy attackers are exposing. Being aware of the potential threats allows individuals and organizations to protect their data. In this white paper, uncover some of the most pertinent security considerations for 2020.
Posted: 09 Dec 2019 | Published: 09 Dec 2019

Splunk

Beginner's Guide to Employee Monitoring
sponsored by ActivTrak
WHITE PAPER: On the surface, employee monitoring systems might seem like a fancy way to babysit employees. However, this technology stands as a far more valuable tool than people give it credit for. In this white paper, learn about several security benefits of employee monitoring systems.
Posted: 27 Nov 2019 | Published: 27 Nov 2019

ActivTrak

Adaptive Multi-Factor Authentication Data Sheet
sponsored by Okta
DATA SHEET: Today identity attacks can result in increased security risks, brand damage and outright fraud. Additionally, customers are expecting seamless access with minimal friction. Read on to learn about Okta Adaptive MFA and how it can allow good users in, while keeping attackers out.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

Okta

Okta + MuleSoft: Comprehensive API Access Control and Management
sponsored by Okta
DATA SHEET: As the most valuable APIs often contain sensitive data, the consequences of getting API security wrong can be significant. It’s critical to implement a solution that enables secure management and access control to your APIs. Read on to learn how Okta and MuleSoft deliver comprehensive API access control and management.
Posted: 04 Dec 2019 | Published: 04 Dec 2019

Okta

How Connected are your Cyber Operations and Business Objectives?
sponsored by Optiv
RESOURCE: Take Optiv’s quiz to help identify how well your cyber operations program is positioned with your organization’s overall business goals and objectives—and see how your cybersecurity stacks up against other organizations.
Posted: 06 Dec 2019 | Published: 06 Dec 2019

Optiv

User Lifecycle Management Proves Costly to IT
sponsored by Okta
WHITE PAPER: An IDG survey reveals that manual processes drain productivity and increase security risks. Read on to learn more about the differences between manual versus automated lifecycle management.
Posted: 09 Dec 2019 | Published: 09 Dec 2019

Okta

Transform the Customer Experience with a Modern Customer IAM Solution
sponsored by Okta
WHITE PAPER: Customer identity and access management (CIAM) allows businesses to keep pace with the growing range of customer interaction interfaces while maintaining security and scalability. In this white paper, explore the growing range of channels driving the need for CIAM and uncover Gartner’s key trends for CIAM solution design.
Posted: 09 Dec 2019 | Published: 09 Dec 2019

Okta
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement