IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Mobile Spam

RSS Feed   
Mobile Spam Reports
 
Secrets to a Stronger Strategy for Container Security
sponsored by Alert Logic
WHITE PAPER: AlertLogic experts have developed, tested, and refined 8 best practices for security in your environment. Read on for more explanation of these practices and some tips for how your Amazon Web Services (AWS) environment can help.
Posted: 17 Oct 2019 | Published: 17 Oct 2019

Alert Logic

Hacker-Powered Data - Security Weaknesses and Embracing Risk with HackerOne
sponsored by HackerOne
WEBCAST: Today, companies, enterprises, & governments are embracing collaboration with hackers to find vulnerabilities before criminals have a chance to exploit them. In this webcast, Miju Han from HackerOne discusses the most common vulnerabilities not found on the OWASP top 10.
Posted: 17 Oct 2019 | Premiered: Oct 17, 2019

HackerOne

Data Loss Protection: Insider Threat Buyers Guide
sponsored by Code42
RESOURCE: Insider threats are the fastest growing risk your organization faces, with insider threats growing more than 50% over the last four years and now accounting for nearly half of all data loss incidents. Discover the risks, problems, solutions and more in this Insider Threat Buyers Guide by Code42.
Posted: 10 Oct 2019 | Published: 10 Oct 2019

Code42

Attack Surface Visibility and Reducing Risk with HackerOne: Verizon Media Webinar
sponsored by HackerOne
WEBCAST: Verizon Media is the media giant that owns a slew of dynamic brands including Yahoo, AOL, Tumblr, that over 1 billion people love and trust. Cybersecurity is paramount in maintaining that trust. In this webinar, learn how their security team worked with HackerOne to run a robust bug bounty program aimed at reducing the risk of a security incident.
Posted: 18 Oct 2019 | Premiered: Oct 18, 2019

HackerOne

Penetration Testing: Protect Critical Assets Using an Attacker’s Mindset
sponsored by IBM
WHITE PAPER: The proliferation of financial losses and brand damage stemming from security breaches means organizations need to be proactive in protecting their most valued assets. In this white paper, learn how IBM X-Force Red penetration testing services can help your organization identify and fix critical vulnerabilities before criminals exploit them.
Posted: 16 Oct 2019 | Published: 16 Oct 2019

IBM

Harnessing Containers for the Big Data Era
sponsored by Aporeto
WHITE PAPER: With the rise of DevOps, Kubernetes has become extremely popular and with good reason, but securing Kubernetes can be challenging. In this white paper, uncover 3 best practices for securing workloads deployed in a Kubernetes cluster.
Posted: 14 Oct 2019 | Published: 31 Jul 2019

Aporeto

Patch Management: Your Biggest Ally in the War Against Cybercrime
sponsored by Panda Security
WHITE PAPER: The majority of attacks and exploits today take advantage of outdated systems and third-party applications, exploiting known vulnerabilities. In this white paper, learn about the dangers of vulnerabilities, including the new BlueKeep vulnerability, and ways you can keep your organization safe.
Posted: 10 Oct 2019 | Published: 10 Oct 2019

Panda Security

The Cyber-Pandemic: IT Attacks in the Healthcare Sector
sponsored by Panda Security
WHITE PAPER: The healthcare industry is moving to store all information electronically which is, without a doubt, beneficial for patients and caregivers. However, this has generated serious security problems for the healthcare industry. In this white paper, learn about attacks to the healthcare industry and how these attacks can be avoided in the future.
Posted: 10 Oct 2019 | Published: 10 Oct 2019

Panda Security

Database Solutions Pocket Book
sponsored by Nutanix
EBOOK: Download this database solutions pocket book to discover how HCI confronts 8 of the top challenges associated with databases, and can deliver the consistent performance, availability, scalability, and management that these workloads need.
Posted: 17 Oct 2019 | Published: 17 Oct 2019

Nutanix

Web Application Firewall Vendor Comparison Report
sponsored by Barracuda
ANALYST REPORT: The following vendor-agnostic Gartner report provides a comprehensive overview of the web application firewall (WAF) market and dissects the strengths and drawbacks of 12 WAF vendors. Download now to use this exclusive resource to decide for yourself which solution provides the best fit for your enterprise.
Posted: 14 Oct 2019 | Published: 17 Sep 2019

Barracuda
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement