IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Wireless Spam

RSS Feed   
ALSO CALLED: Pager Spam, Cell-phone Spam, Push Messaging, Mobile Phone Spam, Cell Phone Spam, SMS Spam, Mobile Spam, Cellphone Spam
DEFINITION: SMS spam (sometimes called cell phone spam) is any junk message delivered to a mobile phone as text messaging through the Short Message Service (SMS). The practice is fairly new to North America, but has been common in Japan for years. In 2001-2002, the systems at DoCoMo, the country's major service provider, were overcome by the volume of SMS spam, causing users' screens to freeze and spreading programs  … 

Wireless Spam definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary
Wireless Spam Reports
1 - 25 of 6471 Matches Previous Page  |  Next Page
'Friendly Friction' the Guide to Optimizing Onboarding
sponsored by Onfido
EBOOK: Tools that make your life more convenient also tend to make it less secure. That being said –when it comes to user onboarding, there's still a tension between onboarding users quickly and keeping compliant. In this white paper, learn 5 ways to make friction friendlier and achieve secure onboarding.
Posted: 22 Apr 2019 | Published: 22 Apr 2019

Onfido

10 Capabilities to Look For in an MDR Solution
sponsored by Arctic Wolf Networks, Inc.
RESOURCE: Multiple point products and defense-in-depth strategies are no longer sufficient to protect companies that operate in today's cyberspace. Learn 10 capabilities to look for in a managed detection and response (MDR) service to help you stay protected in today's evolving threat landscape.
Posted: 14 Mar 2018 | Published: 14 Mar 2018

Arctic Wolf Networks, Inc.

10 Must Knows For Architecting Your Multi-Cloud Security Strategy
sponsored by Trend Micro, Inc.
WHITE PAPER: Security should be an integral part of your cloud strategy. Designing and implementing security controls for your public cloud environment, requires a thorough understanding of the division of responsibilities between the cloud service provider and you as a customer. In this white paper, explore 10 things you should know about multi-cloud security.
Posted: 03 Apr 2019 | Published: 03 Apr 2019

Trend Micro, Inc.

10 Myths in Selecting a Web Application Firewall
sponsored by Akamai
WHITE PAPER: Securing your web applications can be a daunting task. However, a web application firewall (WAF) can help keep threats at bay while preserving application performance. The challenge is choosing the right WAF. This white paper dispels 10 WAF myths that will help you evaluate what matter most when choosing a WAF.
Posted: 09 Jul 2019 | Published: 30 Apr 2019

Akamai

10 Questions to Answer Before Adopting SaaS SIEM
sponsored by LogRhythm, Inc.
ANALYST REPORT: SaaS-like options for leveraging SIEM technologies are becoming more common. Download this Gartner research report to explore a series of questions that should be asked and answered when considering SaaS SIEM to determine if it's an appropriate option for your organization.
Posted: 23 Aug 2019 | Published: 05 Nov 2018

LogRhythm, Inc.

10 Questions to Ask About Your Office 365 Deployment
sponsored by Mimecast
ANALYST REPORT: Providing robust email security is a critical best practice for any organization in an era of increasingly sophisticated email-borne attacks. While Office 365 provides some native protections, there are limitations to consider. In this research report, explore key issues to consider when evaluating the email security capabilities of Office 365.
Posted: 05 Aug 2019 | Published: 30 Jun 2019

Mimecast

10 Questions You Should be Asking to Develop an IT Strategy Plan
sponsored by Involta
WHITE PAPER: Companies spend anywhere from three to seven percent of their revenue on IT depending on their size. Yet despite these numbers, many organizations still lack a future oriented IT strategy. Inside, uncover ten internal questions that should be asked to develop a complete IT strategy.
Posted: 22 May 2019 | Published: 22 May 2019

TOPICS:  CIOs | IT Management
Involta

10 Signs It's Time To Review Your Endpoint Protection
sponsored by Blackberry Cylance
RESOURCE: Cyber attacks are increasing in frequency, and effectiveness. The ongoing trend of successful attacks demonstrates that cybersecurity practices are not keeping pace with modern threats. Is your organization well-defended? In this infographic, explore 10 signs that will help you determine whether your endpoint security strategy needs to be updated.
Posted: 25 Jun 2019 | Published: 25 Jun 2019

Blackberry Cylance

10 Ways Prisma Public Cloud Complements Cloud-Native Security
sponsored by Palo Alto Networks
DATA SHEET: Learn how Prisma Cloud complements your cloud-native security.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

Palo Alto Networks

10-Step Guide to the Cost-Effective Cloud
sponsored by Magenic
WHITE PAPER: In this guide, learn the ten preparation steps your organization should use to ensure you're leveraging the cloud in the most cost-effective manner, while still getting the most bang-for-your-buck.
Posted: 14 Aug 2018 | Published: 14 Aug 2018

Magenic

11 Guidelines for Minimizing Vulnerability for IBM z/OS while Improving Compliance
sponsored by BMC
WHITE PAPER: The traditionally under protected enterprise mainframe can be a huge target for hackers. So, how do you safeguard it? In this white paper, learn about 11 steps you can take to strengthen z/OS security and compliance—and safeguard your critical business data.
Posted: 20 May 2019 | Published: 20 May 2019

BMC

13 Things Your Next Firewall Must Do
sponsored by Palo Alto Networks
WHITE PAPER: The rapid evolution of IT has changed the face of the network perimeter. The result is an incredibly complex network that introduces significant business risk. In this white paper, explore the evolution of the firewall to "next-generation" and discover 13 key things a next-generation firewall must do to secure your network and your business.
Posted: 09 Aug 2019 | Published: 09 Aug 2019

Palo Alto Networks

"Hacking as a Service," and Other Emerging Threats
sponsored by SearchSecurity.com
EZINE: Lethal threats to enterprise security are emerging from every which way. Access this exclusive edition of Information Security Magazine to learn just what you're up against.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

SearchSecurity.com

10 Common Mistakes of Incident Responders
sponsored by Intel Security
WHITE PAPER: Learn from your peers. Compare these 10 common mistakes to your incident response practices to improve effectiveness.
Posted: 21 Sep 2016 | Published: 21 Sep 2016

TOPICS:  IT Management
Intel Security

10 Essential Elements for a Secure Enterprise Mobility Strategy
sponsored by Citrix
WHITE PAPER: This resource guides you through the top 10 considerations when developing a mobile strategy.
Posted: 30 Apr 2014 | Published: 31 Mar 2014

Citrix

10 Essentials for Secure EMM
sponsored by Citrix
WHITE PAPER: This resource offers 10 key guidelines to securing mobile strategies so that organizations are confident in their defenses against theft and loss while users are satisfied with performance.
Posted: 09 May 2014 | Published: 01 Jun 2014

Citrix

10 Must Haves for Secure Enterprise Mobility
sponsored by Citrix
WHITE PAPER: In this resource, discover 10 valuable features to include when creating a mobile security strategy so that your organization can fully realize the benefits of BYOD policies.
Posted: 27 Dec 2013 | Published: 31 May 2013

Citrix

10 Network Security Tools and Tests Everyone Should Use
sponsored by Global Knowledge
WHITE PAPER: This paper provides a list of 10 security tools or tests that will help you check out suspicious issues and keep ahead of new risks and threats.
Posted: 14 Apr 2014 | Published: 14 Apr 2014

Global Knowledge

10 Reasons LinuxONE is the Best Choice for Linux Workloads
sponsored by IBM
WHITE PAPER: Here's a freebie: Linux applications on x86 servers is 65% more expensive than on LinuxONE servers. Read on for 10 more.
Posted: 06 Apr 2017 | Published: 06 Apr 2017

TOPICS:  IT Management
IBM

10 Steps for Early Incident Detection
sponsored by Tripwire, Inc.
WHITE PAPER: The earlier a security breach is detected, the faster an organization can recover. View this informative white paper to learn more about the ten steps to faster detection of security incidents. IT security is only as effective as it's response time, so be sure you're prepared for a breach.
Posted: 02 Oct 2012 | Published: 02 Oct 2012

Tripwire, Inc.

10 Steps to Email Security
sponsored by Clearswift
WHITE PAPER: This white paper outlines the 10 simple steps to best practice in email security including the application of policy, technology and processes designed to keep email safe and secure.
Posted: 10 Sep 2010 | Published: 12 Aug 2013

Clearswift

10 Steps to Mobile Security
sponsored by Sybase iAnywhere
WHITE PAPER: Security is the top priority on everyone's minds, especially with the growth of mobile devices on the rise. This paper details the 10 critical steps to ensure a successful mobile security strategy.
Posted: 02 Jan 2007 | Published: 01 Nov 2006

Sybase iAnywhere

10 Things to Consider When Choosing IT Service Desk Software
sponsored by Cherwell
WHITE PAPER: Here are 10 things to consider before selecting a vendor.
Posted: 28 Jun 2017 | Published: 28 Jun 2017

TOPICS:  IT Management
Cherwell

10 Ways to Build a Better Big Data Security Strategy
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: This informative whitepaper explores the role of Big Data and outlines 10 best practices for Big Data security.
Posted: 12 May 2014 | Published: 31 Jan 2014

Hewlett-Packard Enterprise

15 Point Checklist Cloud Data Protection
sponsored by SkyHigh
WHITE PAPER: This resource offers 5 exclusive tips for protecting business data across all cloud services.
Posted: 28 May 2014 | Published: 28 May 2014

SkyHigh
1 - 25 of 6471 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement