IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

SMS Spam

RSS Feed   
SMS Spam Reports
 
Avoiding APTs: Defending your Critical Infrastructure
sponsored by Panda Security
WHITE PAPER: Cybersecurity technology is constantly innovating to stay ahead of the latest threats, including APTs. In this e-book, learn about APTs, the impacts they can have on critical infrastructure and ways you can proactively protect your organization.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

Panda Security

NWN Security
sponsored by NWN Corporation
DATA SHEET: In this solution brief, learn how NWN Security can help you combat the architectural and operational challenges of implementing and maintaining a secure environment.
Posted: 09 Oct 2019 | Published: 09 Oct 2019

NWN Corporation

The Superpower of “Yes! But…”
sponsored by PortSys
RESOURCE: There was a time not so long ago when security administrators ruled over their IT fiefdoms through the Superpower of NO! Want access with a mobile device? NO! Want access from home? NO! Want access from the road? NO! In this blog post, learn how and why security’s superpower of “NO!” turned into “Yes! But…”
Posted: 09 Oct 2019 | Published: 09 Oct 2019

PortSys

Detect On-Prem Privileged Account Risk and Vulnerabilities with Cyberark Zbang
sponsored by CyberArk Software, Inc
DATA SHEET: In this brief, learn about the capabilities of the CyberArk zBang tool and how it creates an in-depth risk assessment that automates and unifies manual scans that uncover privileged access security risk across on-premises environments.
Posted: 10 Oct 2019 | Published: 10 Oct 2019

CyberArk Software, Inc

Dutch DIY Giant Shelves Email Attacks
sponsored by Barracuda
CASE STUDY: As email impersonation attacks and CEO fraud pick up momentum worldwide, Intergamma IT Manager Ruud Bronswijk knew there was an urgent need to improve the DIY company’s defenses. To discover how Intergamma ultimately bolstered their Office 365 security to thwart a variety of email-based attacks, download the case study here.
Posted: 14 Oct 2019 | Published: 14 Oct 2019

Barracuda

Accelerate Cloud App Adoption without Compromising Security
sponsored by Forcepoint
WEBCAST: In multi-cloud environments, every cloud service has its own security framework, different APIs and different authentication mechanisms. The key question is; how do you make sure you have a consistent security strategy across all your cloud services? Tune into this webinar to find out.
Posted: 14 Oct 2019 | Premiered: Oct 14, 2019

Forcepoint

When MDM is Not Enough: Context is Key
sponsored by PortSys
RESOURCE: While Mobile Device Management (MDM) helps to manage a smartphone or tablet device to ensure that device is valid and approved, beyond this, many organizations still rely on usernames and passwords to determine access privilege. Read this article for reasons on why access control is so important when managing mobile devices today.
Posted: 03 Oct 2019 | Published: 01 Nov 2018

PortSys

5 Best Practices in Cloud Security for Legal
sponsored by ShieldX
WHITE PAPER: Everyone is moving to the cloud. But unfortunately, cloud adoption is moving too fast for security to keep up. This e-book outlines a series of best practices from Alaska Air and IDT about how they were able to resolve the security challenges presented by moving core services to the cloud. Read on for 5 best practices these customers have shared.
Posted: 14 Oct 2019 | Published: 14 Oct 2019

ShieldX

Can Zero Trust Fix What’s Wrong with IT Security?
sponsored by PortSys
RESOURCE: Why is zero trust such a prominent discussion both in the board room and among IT security professionals? Read this article for a look at how zero trust access changes the IT security game today.
Posted: 01 Oct 2019 | Published: 01 Oct 2019

PortSys

PortSys Total Access Control Case Study
sponsored by PortSys
RESOURCE: While all companies are concerned about security, those in the financial services industry are especially so. Read this case study to see how a financial services firm used PortSys Total Access Control to address risk-based security for their devices and applications.
Posted: 27 Sep 2019 | Published: 27 Sep 2019

PortSys
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement