IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Mobile Spam

RSS Feed   
Mobile Spam Reports
 
The Cost of IT Downtime Calculator
sponsored by Databarracks
EBOOK: Explore this e-book to use an interactive downtime calculator that can improve the standard of business continuity planning for your enterprise, avail you of the true cost of downtime for you specifically, and help you justify any future investment in disaster recovery technologies.
Posted: 17 Feb 2020 | Published: 17 Feb 2020

Databarracks

4 Ways to Leverage the MITRE ATT&CK Framework in Your Security Operations
sponsored by D3 Security
WHITE PAPER: While the MITRE ATT&CK Framework is popular amongst security professionals, many teams struggle to get optimize its efficiency. In this white paper, learn 4 ways your security team can incorporate the MITRE ATT&CK Framework into your operations.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

D3 Security

Excessive Permissions Are Your No. 1 Cloud Threat
sponsored by Radware
WHITE PAPER: As organizations continue to migrate their workloads to public cloud environments, they should be mindful that they own the responsibility of safeguarding their data, regardless of who is hosting it. Download this white paper to discover how to address the top cloud migration security challenges.
Posted: 25 Feb 2020 | Published: 31 Mar 2019

Radware

Achieving HIPAA Compliance
sponsored by Absolute Software Corporation
WHITE PAPER: Tap into this HIPAA Compliance Guide to see how Absolute can help you eliminate compliance failures and provide you with endpoint visibility and control.
Posted: 21 Feb 2020 | Published: 21 Feb 2020

Absolute Software Corporation

Asplundh Tree Expert
sponsored by Absolute Software Corporation
CASE STUDY: In this case study, discover how Asplundh, a vegetation management organization, partnered with Absolute to establish inventory management and secure the devices of their increasingly distributed workforce.
Posted: 19 Feb 2020 | Published: 26 Apr 2019

Absolute Software Corporation

Introducing CyberArk Alero: Reduce Risk from Remote Vendors
sponsored by CyberArk Software, Inc
RESOURCE: Yesterday’s VPNs, passwords, and other remote access security tools no longer provide adequate protection against today’s threats. In this blog post, get an inside look at CyberArk’s Alero offering, designed to address the risks associate with remote access using zero-trust, biometrics and just-in-time provisioning.
Posted: 25 Feb 2020 | Published: 17 Jul 2019

CyberArk Software, Inc

Business Email Compromise
sponsored by PhishLabs
WHITE PAPER: Traditional phishing certainly can (and does) cause a lot of damage to organizations, but on a per-attack basis, Business Email Compromise (BEC) is undoubtedly the most expensive. Why? View this guide to uncover everything you need to know about BEC attacks today.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

PhishLabs

Fortinet Secure Hybrid Cloud
sponsored by Fortinet, Inc.
DATA SHEET: Security across the hybrid cloud environment tends to be inconsistently enforced and complex to manage—and connections are often unsecure. Luckily, the Fortinet Security Fabric addresses these challenges. Read on to learn more.
Posted: 26 Feb 2020 | Published: 26 Feb 2020

Fortinet, Inc.

Bridge The IT/OT Divide to Bolster ICS Cybersecurity
sponsored by Fortinet, Inc.
WHITE PAPER: A growing trend among manufacturers is the digitization of the factory floor. A recent Forrester study sought to explore this trend and discover the common tactics and challenges regarding industrial control system (ICS) security. Download this white paper to uncover the full results from the Forrester study.
Posted: 26 Feb 2020 | Published: 30 Nov 2019

Fortinet, Inc.

Cryptomining - How Cryptocurrency is Changing Cyber Security
sponsored by Cisco Umbrella
WEBCAST: The introduction of cryptocurrencies has changed the cyber threat landscape. New varieties of ransomware in the form of cryptojacking, mining, and exchange phishing are plaguing today’s businesses. In this episode of ‘A Cybersecurity Technical Mini Series’, learn how you can stay protected.
Posted: 13 Feb 2020 | Premiered: Dec 16, 2019

Cisco Umbrella
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info