IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

SMS Spam

RSS Feed   
SMS Spam Reports
 
SIG - More Organizations are Using a Secure Internet Gateway for Secure Access
sponsored by Cisco Umbrella
WHITE PAPER: What if you could provide workers with safe access to the internet — no matter what device they’re using or where they’re located, even if they aren’t on the VPN? A Secure Internet Gateway (SIG) provides just that. Download this trend report to unlock an in-depth analysis of SIG.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Cisco Umbrella

2019 Crowdstrike Global Security Attitude Survey
sponsored by CrowdStrike
WHITE PAPER: In today’s threat landscape, cyberattacks are unavoidable. The best way to address threats is to establish an incident response plan. This report takes a closer look at the 1:10:60 rule for measuring the effectiveness of your response plan and explores the results of a recent study into the current state of cybersecurity capabilities.
Posted: 21 Feb 2020 | Published: 15 Nov 2019

CrowdStrike

Data Security for the Way People Work
sponsored by Dell and Intel
WHITE PAPER: Faced with a growing array of threats and the challenge of enabling the mobile workforce, IT leaders should tailor their security strategy to focus on the way end users work. Download this report to uncover the common threats and key tactics to consider when implementing a security plan.
Posted: 19 Feb 2020 | Published: 19 Feb 2020

Dell and Intel

The Risk Conversation
sponsored by IT Glue
EBOOK: This e-book provides guidelines for having the risk conversation with your clients and how it can benefit you as an MSP. Download now for more info on the 4 pillars of risk management, using risk assessments in sales and QBRs, and more
Posted: 21 Feb 2020 | Published: 21 Feb 2020

IT Glue

APEIRO Micro-Segmention - ACLs and Least Privilege to L7
sponsored by ShieldX
VIDEO: Micro-segmentation must adhere to the “organizing principle” of least privilege.What does that mean exactly? View this video to find out.
Posted: 13 Feb 2020 | Premiered: 13 Feb 2020

ShieldX

Fujitsu & VMware – Multi-Cloud Security
sponsored by Fujitsu
WEBCAST: In this video, Fujitsu & VMware experts offer insights, guidance, and solutions to overcome the challenges of cloud security to ensure your applications, workloads and data are ‘secure by design’ – whether at rest or in motion as you transform.
Posted: 13 Feb 2020 | Premiered: Dec 3, 2019

Fujitsu

The Ransomware Recovery Guide: How to Spot, Prevent and Recover from Ransomware
sponsored by Databarracks
WHITE PAPER: Ransomware affects everyone, making awareness, education, and defense crucial to keeping your sensitive data secure. Access this white paper to learn what ransomware looks like, how to recover from it, and 2 proactive steps to take in order to thwart a potential attack.
Posted: 17 Feb 2020 | Published: 17 Feb 2020

Databarracks

Looker trusts Opsgenie to help deliver their service to 200,000 users every day
sponsored by Atlassian
CASE STUDY: Clear communication is essential in the business world, where problems arise quickly wreak havoc on a company’s service and bottom line. Relying on only Slack to communicate with your employees and customers just doesn’t cut it. Read on to learn how Opsgenie’s alert services helped on of their clients improve communication and minimize downtime.
Posted: 20 Feb 2020 | Published: 20 Feb 2020

Atlassian

Security at the Speed of Your Network
sponsored by Gigamon
WHITE PAPER: Read “Security at the Speed of Your Network” to learn how to use an architectural approach that improves security posture and reduces costs without painful compromises on performance.
Posted: 18 Feb 2020 | Published: 18 Feb 2020

Gigamon

CIS Critical Security Controls Evaluation Guide
sponsored by Absolute Software Corporation
WHITE PAPER: The Center for Internet Security (CIS) Critical Security Controls have become a trusted resource for organizations looking to identify threats and enhance security. This evaluation guide measures the Absolute Platform against the CIS Top 20 Critical Security Controls to illustrate its capabilities.
Posted: 14 Feb 2020 | Published: 02 Nov 2018

Absolute Software Corporation
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info