IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Push Messaging

RSS Feed   
Push Messaging Reports
 
Podcast: Privileged Account Governance and Incident Response
sponsored by One Identity
PODCAST: A lot of organizations believe they have the right policies in place to minimize their risks. But, that is rarely the case especially when it comes to privileged accounts. In this podcast, listen as Kevin Beaver and Richard Hosgood discuss privileged account management and how One Identity Safeguard can help organizations address incident response.
Posted: 13 Jun 2019 | Premiered: Jun 13, 2019

One Identity

Qualcomm's Alex Gantman on Bug Bounties
sponsored by HackerOne
CASE STUDY: Qualcomm's technologies are powering the world of connected devices. But since Qualcomm's technology isn't the end product, it's difficult to determine the root of a device's vulnerability. In this case study, see what the VP of Engineering at Qualcomm, had to say about the company's approach to bug bounties and hacker-powered security.
Posted: 14 Jun 2019 | Published: 22 Jun 2017

HackerOne

Cybersecurity and Data Management in the Modern Digital Age
sponsored by Rapid7
EBOOK: In this definitive resource, discover over 150 pages of insights on the cyber and data threats facing every business, and how you can respond.
Posted: 26 Jun 2019 | Published: 26 Jun 2019

Rapid7

Out-task Or Outsource?
sponsored by ProAct
WHITE PAPER: In this guide, find out what separates out-tasking and outsourcing from one another, and get several use cases that stand to benefit from each method. Plus, discover a seven-step roadmap that can help your organization find its best case IT service distribution scenario.
Posted: 21 Jun 2019 | Published: 21 Jun 2019

ProAct

20 Docker and Container Experts to Follow Online
sponsored by New Relic
JOURNAL ARTICLE: Any business interested in container implementation will need to self-educate for a smooth adoption process. View this article to learn and connect with 20 containers experts that will be sure to help your container initiative.
Posted: 20 Jun 2019 | Published: 08 Jun 2018

New Relic

Webinar: CCPA Explained
sponsored by Okera
WEBCAST: As privacy regulations like CCPA and GDPR continue to proliferate, organizations need to become proactive and avoid a free-for-all approach that can leave them vulnerable to massive fines. In this webcast, Mark Donsky, Head of Product at Okera discusses CCPA and how to best protect your customers' sensitive information to avoid costly penalties.
Posted: 21 Jun 2019 | Premiered: Jun 21, 2019

Okera

What Is Phishing and What Are Top CISOs Doing About It?
sponsored by Inky Technology
RESOURCE: In the last year, different types of phishing attacks have begun to emerge. One example is a wire transfer scam in which attackers steal money from companies after suggesting an overdue bill or unpaid invoice. Download this blog to explore different types of phishing attacks and see what businesses can do to prevent them.
Posted: 24 Jun 2019 | Published: 24 Jun 2019

Inky Technology

Automated Security for DevOps
sponsored by Data Theorem
WEBCAST: DevOps teams are continuously delivering innovations that turn business decisions into reality. But, this accelerated speed can create chaos. In this short video, learn how Data Theorem can help DevOps teams improve productivity and speed with continuous automation and security.
Posted: 24 Jun 2019 | Premiered: Jun 24, 2019

Data Theorem

How to Deal with Fraudulent Counterfeit Apps
sponsored by Data Theorem
WEBCAST: A counterfeit app is an unauthorized app that exploits the reach and user of a brand or mobile app for financial gain. In this webinar, learn about the different types of counterfeit apps and how to spot them.
Posted: 24 Jun 2019 | Premiered: Jun 24, 2019

Data Theorem

Report: Hyperconverged Infrastructure Buyer Trends and Use Cases
sponsored by VMware
ANALYST REPORT: Read this Evaluator Group report to determine if your company would benefit from HCI. The details include HCI deployment models and use cases, buying decision factors, HCI products and vendors, and more.
Posted: 20 Jun 2019 | Published: 20 Jun 2019

VMware
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement