IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Push Messaging

RSS Feed   
Push Messaging Reports
 
Definitive Guide to Moving Target Defense for Automated Bot Attacks
sponsored by BotRX
WHITE PAPER: As of February 2020, the total number of websites has topped 1.7 billion, with nearly half of the traffic to those sites credited to bots. Threat actors have evolved malicious bots to where their detection has become near-impossible, even by advanced AI & ML. But there’s another way. Read this white paper to learn about Moving Target Defense.
Posted: 25 Sep 2020 | Published: 25 Sep 2020

BotRX

Exploiting a Pandemic Coronaphish COVID-19 Phishing Scams
sponsored by Inky Technology
WHITE PAPER: Phishing scams are constantly evolving, seeking out more effective ways to bypass security measures and trick recipients. In this edition of Understanding Phishing, explore how the COVID-19 pandemic has changed phishing campaigns by dissecting a few real-world examples.
Posted: 01 Oct 2020 | Published: 01 Oct 2020

Inky Technology

Ask These Critical Questions and Consider These Risks When Selecting an MDR Provider
sponsored by GoSecure
RESOURCE: According to Gartner, 25% of organizations will be using managed detection and response (MDR) services by 2024. So when considering key requirements and managing risks associated with outsourcing threat detection and response, it’s critical that you ask the right questions. View this Gartner report to learn what these questions are and more.
Posted: 23 Sep 2020 | Published: 31 Oct 2019

GoSecure

Cybersecurity Risk: A Board’s-Eye View Chapter 2
sponsored by PortSys
EBOOK: When it comes to zero-trust architecture, there is no one-size-fits-all package. It’s crucial that you consider which type of zero trust could best suit your organization, especially given the recent spike in vendors boasting zero-trust capabilities. Read this short white paper to learn the 3 different flavors of zero trust.
Posted: 28 Sep 2020 | Published: 01 Aug 2020

PortSys

High-Availability Solutions Deliver Nonstop IT for Uninterrupted Service
sponsored by SUSE
WHITE PAPER: In any enterprise, service interruptions for customers, partners, or employees as a result of IT downtimes can become expensive—in some cases, catastrophically so. Jump inside this white paper to learn how to pinpoint the right solutions that will deliver uninterrupted services to the highest caliber.
Posted: 28 Sep 2020 | Published: 28 Sep 2020

SUSE

8 Biggest Mistakes IT Practitioners Make and How to Avoid Them
sponsored by Splunk
WHITE PAPER: Odds are, as an IT professional, you spend most of your time constantly trying to pinpoint and fix one problem after another—all while maintaining system availability and performance to keep everyone happy. Learn how to break out of the cycle in this guide, which assesses the 8 biggest mistakes IT practitioners make and how to avoid them.
Posted: 24 Sep 2020 | Published: 24 Sep 2020

TOPICS:  IT Management
Splunk

Understanding Phishing: Text Direction Deception!
sponsored by Inky Technology
WHITE PAPER: Phishing scams continue to evolve, and attackers apply an ever-growing bag of tricks to fool recipients as well as email protection tools. In this edition of Understanding Phishing, the cybersecurity experts at INKY dissect a recently uncovered tactic which uses Cascading Style Sheets (CSS) to bypass security protocols by mixing scripts.
Posted: 30 Sep 2020 | Published: 30 Sep 2020

Inky Technology

COVID-19 Challenges for the Borderless Enterprise
sponsored by Infoblox
ANALYST REPORT: Prior to the COVID-19 crisis, only 21% of organizations globally had over half of their workforce working remotely. However, the COVID-19 crisis has forced companies to become “borderless,” pushing these numbers up. Download this research report to uncover more key findings from a recent survey on COVID-19 challenges for the borderless enterprise.
Posted: 29 Sep 2020 | Published: 29 Sep 2020

Infoblox

Enduring From Home
sponsored by Malwarebytes
ANALYST REPORT: 2020 is a test of business continuity. Now-remote workers are connecting to potentially unsecured home networks while accessing company resources from personal devices, and their unique cybersecurity needs must be considered. Read this report to learn perspectives on IT leaders on the sudden shift to remote work and its impact on security.
Posted: 30 Sep 2020 | Published: 30 Sep 2020

Malwarebytes

10-Minute Webinar: Strategies to Work from Anywhere
sponsored by Okta
WEBCAST: Telework involves more than getting your employees up and running with video conferencing – it requires a massive shift in how people work and how you think about securing users and their devices. Don’t float adrift in a sea of distributed workforce challenges – watch this 10-minute webinar and learn how to manage access and security.
Posted: 30 Sep 2020 | Premiered: Jul 24, 2020

Okta
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info