IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >   Spam  >  

Wireless Spam

RSS Feed   
ALSO CALLED: Pager Spam, Cell-phone Spam, Push Messaging, Mobile Phone Spam, Cell Phone Spam, SMS Spam, Mobile Spam, Cellphone Spam
DEFINITION: SMS spam (sometimes called cell phone spam) is any junk message delivered to a mobile phone as text messaging through the Short Message Service (SMS). The practice is fairly new to North America, but has been common in Japan for years. In 2001-2002, the systems at DoCoMo, the country's major service provider, were overcome by the volume of SMS spam, causing users' screens to freeze and spreading programs  … 

Wireless Spam definition sponsored by SearchMobileComputing.com, powered by WhatIs.com an online computer dictionary
Wireless Spam Reports
201 - 225 of 6396 Matches Previous Page  |  Next Page
6 Steps to Overcoming PCI DSS Compliance Challenges in Multi-Cloud and Hybrid Environments
sponsored by Alert Logic
EBOOK: This e-book examines the challenges inherent in achieving continuous PCI DSS compliance across multi-cloud and hybrid landscapes and what to look for in evaluating solutions and service providers that can address those complexities.
Posted: 17 Oct 2019 | Published: 17 Oct 2019

Alert Logic

6 Steps to Securing Enterprise Data
sponsored by BigID
WHITE PAPER: Organizations of all sizes need a strong data-centric security policy. Start with these 6 key steps to secure sensitive and personal data across the enterprise.
Posted: 09 Jan 2020 | Published: 09 Jan 2020

BigID

6 Steps to SIEM Success
sponsored by AT&T Cybersecurity
RESOURCE: Ready for SIEM deployment? Whether your goals are to detect threats, achieve compliance, or fuel incident response, these 6 steps to SIEM success will guide your team through key considerations to choose a SIEM platform that will work for your environment.
Posted: 31 Jul 2018 | Published: 30 Jun 2017

AT&T Cybersecurity

6 Ways Digital Process Automation Can Transform Business Operations
sponsored by K2
WHITE PAPER: Digital process automation (DPA) stands out as unique opportunity for organizations feeling the pressures of today's hyper-competitive market, but understanding the holistic business impact of process automation can be difficult to grasp. Inside, discover 6 examples of the business impact process automation can have.
Posted: 07 Feb 2019 | Published: 07 Feb 2019

K2

7 Common Security Pitfalls to Avoid When Migrating to The Cloud
sponsored by HackerOne
WHITE PAPER: The speed of cloud migration is outpacing the speed of security team expansion. How do you keep up? Read on to learn how to prevent such a security regression when migrating to the cloud.
Posted: 08 Mar 2019 | Published: 08 Mar 2019

HackerOne

7 SIEM Trends to Watch in 2019
sponsored by Splunk
WHITE PAPER: In recent years, SIEM solutions have become more of an information platform, with enterprise demands for better security driving much of the SIEM market. In this white paper, explore 7 SIEM trends to watch in 2019.
Posted: 19 Mar 2019 | Published: 19 Mar 2019

Splunk

7 steps to operationalize your micro-segmentation deployment
sponsored by Guardicore
WHITE PAPER: Micro-segmenting your networks is a good idea because it creates secured, isolated zones, thus reducing the organizational attack surface. However, a key aspect of a successful micro-segmentation project is making sure you're prepared. In this white paper, explore 7 steps to operationalize your micro-segmentation deployment.
Posted: 18 Jun 2019 | Published: 18 Jun 2019

Guardicore

7 Steps to Secure Your Supply Chain
sponsored by RackTop Systems
RESOURCE: Supply chain security requires a multifaceted approach to protecting the checkpoints, assets and infrastructures involved with the production of a product. In this resource, explore 7 steps to securing your supply chain.
Posted: 08 Aug 2019 | Published: 08 Aug 2019

RackTop Systems

7 Tips to Get New Engineers Ready to Be On-Call
sponsored by Atlassian
WHITE PAPER: For new engineers, shouldering the shared on-call responsibilities that DevOps encourages can seem like a daunting task. Inside, uncover 7 tips for prepping your newest engineers for their upcoming on-call responsibilities – including configuring notification alerts, tech stack training advice, and more.
Posted: 08 Jul 2019 | Published: 08 Jul 2019

Atlassian

6 Steps to Prevent a Data Breach
sponsored by Symantec Corporation
BROCHURE: Read this one-page document to learn the six helpful steps any organization can take to reduce data breaches.
Posted: 03 Sep 2009 | Published: 03 Sep 2009

Symantec Corporation

6 Steps to SIEM Success
sponsored by AT&T Cybersecurity
WEBCAST: In this webinar, explore the six key steps every IT practitioner should take to go from installation to insight as quickly as possible with a SIEM solution. You'll learn how to leverage SIEM event correlation to aggregate, correlate and analyze all of the security-relevant log data in your environment.
Posted: 16 Oct 2013 | Premiered: Oct 16, 2013

AT&T Cybersecurity

6 Tips for Building a Future-Ready Infrastructure
sponsored by Dell, Inc. and Intel®
WHITE PAPER: Tomorrow's workloads will be even heavier than today's. Learn how to future-proof your server to scale as demand grows.
Posted: 11 Mar 2015 | Published: 31 Jan 2015

TOPICS:  IT Management
Dell, Inc. and Intel®

6 Ways Hackers Try to Break Secure Sockets Layer-Encrypted Data
sponsored by Symantec & Blue Coat Systems
EGUIDE: How do hackers break through secure sockets layer-encrypted data exactly? This expert e-guide has the answer, exploring six common methods these cyber-criminals use.
Posted: 14 Oct 2014 | Published: 14 Oct 2014

Symantec & Blue Coat Systems

6 Ways to Enhance Security in AWS
sponsored by SafeNet, Inc.
WHITE PAPER: In this white paper, learn why Amazon Web Services (AWS) is a leading cloud service, with a strong partnership with a security provider that provides 6 additional security enhancements to better protect data.
Posted: 05 Jun 2014 | Published: 28 Feb 2014

SafeNet, Inc.

6 Ways to Prevent Ransomware in Health IT
sponsored by Cisco Umbrella
EGUIDE: With so much at risk for healthcare organizations, IT must implement proactive steps to help mitigate their risks and keep attacks at bay. In this e-guide, you'll uncover the ins and outs of 6 ransomware prevention tips healthcare organizations should include as part of their ongoing security strategy.
Posted: 12 Jul 2018 | Published: 12 Jul 2018

Cisco Umbrella

7 Benefits You Realize with a Holistic Data Protection Approach
sponsored by Commvault
WHITE PAPER: Legacy recovery can't handle today's 24/7 environment. Discover an approach that lets you better understand your data.
Posted: 30 Jun 2015 | Published: 30 Jun 2015

TOPICS:  IT Management
Commvault

7 Elements of Cybersecurity Readiness
sponsored by Cisco Umbrella and Dimension Data
EGUIDE: Discover the 7 elements of cybersecurity readiness an organization needs to possess for a high degree of situational awareness into its network operations and network utilization.
Posted: 29 Mar 2017 | Published: 20 Mar 2017

Cisco Umbrella and Dimension Data

7 Essential Steps to Achieve, Measure and Prove Optimal Security Risk Reduction
sponsored by Qualys, Inc.
WHITE PAPER: Rapid changes within technology, new server and software deployments, and the evolving sophistication of attack methods used to infiltrate systems and steal data create the greatest set of challenges faced by security and IT administrators trying to keep their systems secure and within regulatory compliance. Interested in reducing security risk?
Posted: 20 Oct 2009 | Published: 20 Oct 2009

Qualys, Inc.

7 Key Factors to Software Protection
sponsored by Arxan
WHITE PAPER: This white paper explores the magnitude and types of software piracy threats and details the seven key application security factors that must be considered during the development process.
Posted: 08 Jun 2007 | Published: 01 Jun 2007

Arxan

7 Keys to Success for Managing a Business-Critical Cloud with Confidence
sponsored by Hewlett Packard Enterprise
WHITE PAPER: Need a few tips on how to manage your cloud infrastructure? Here are seven best practices that will keep your business-critical cloud environment up and running.
Posted: 01 May 2012 | Published: 26 Apr 2012

Hewlett Packard Enterprise

7 Multicloud Management Best Practices
sponsored by CloudHealth by VMware
WHITE PAPER: Read this paper to learn the 7 best practice to help you overcome the challenges of managing a multicloud environment.
Posted: 14 Dec 2018 | Published: 14 Dec 2018

TOPICS:  IT Management
CloudHealth by VMware

7 Reasons to Worry About Your Current Email Archiving Strategy
sponsored by Commvault
WHITE PAPER: Can your email archiving strategy meet your long-term goals? Find out with these 7 warning signs.
Posted: 01 Jul 2015 | Published: 01 Jul 2015

TOPICS:  IT Management
Commvault

7 Reasons Why Appliances Improve Your Backup Infrastructure
sponsored by Veritas
WHITE PAPER: Discover how using an appliance for backup and recovery simplifies IT processes and reduces costs.
Posted: 29 Mar 2017 | Published: 29 Mar 2017

TOPICS:  IT Management
Veritas

7 Requirements of Data Loss Prevention
sponsored by Symantec Corporation
WHITE PAPER: This report provides a clear understanding of the capabilities a successful data loss prevention solution must deliver. It also incorporates insight into the capabilities that companies require from their solution.
Posted: 10 Mar 2009 | Published: 10 Mar 2009

Symantec Corporation

7 Steps to Overcome SSL Security Issues and Vulnerabilities
sponsored by Fortinet, Inc.
EGUIDE: As SSL technology evolves and changes, new vulnerabilities begin to cause problems. Inside this guide, industry expert Rob Shapland explains how security professionals can overcome these SSL security issues with 7 key steps.
Posted: 02 Jun 2017 | Published: 25 May 2017

Fortinet, Inc.
201 - 225 of 6396 Matches Previous Page    7 8 9 10 11 12    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info