716 Results for:SPAM

  • Sort by: 

Allowlisting vs. blocklisting: Benefits and challenges

By Ashwin Krishnan 17 Oct 2023

Allowlisting and blocklisting are key components of access control. Learn the benefits and challenges of each approach and why a combination of the two is often the best strategy. Read More

Using generative AI to improve VoIP communications

By Venus Kohli 12 Sep 2023

Generative AI has the potential to dramatically reshape how companies manage their VoIP communications. A more intelligent chatbot could do a lot of wonders. Read More

Authentication takes a bite out of spam

24 Jul 2005

Network and messaging experts offer helpful ammunition for network managers waving the white flag in the battle against spam. Read More

Security pros grumble over spam increase

02 Jan 2007

Spim and spam from unexpected sources is challenging enterprises in 2007. Some enterprises are taking action. Read More

Latest ONS data shows that 10% of UK businesses plan to adopt AI

By Cliff Saran 16 Jun 2023

The Office for National Statistics has found that UK adults are aware they have been using AI-based chatbots, and approximately one in six businesses are implementing AI applications Read More

U.S. data privacy protection laws: 2024 guide

By Paul Kirvan 20 Mar 2024

Concerns about how personal data is processed and stored is leading to the passage of new privacy regulations that govern how companies handle consumer data. Read More

How to solve 2 MFA challenges: SIM swapping and MFA fatigue

By Kyle Johnson, Packt Publishing 01 Dec 2023

While MFA improves account security, attacks still exploit it. Learn about two MFA challenges -- SIM swapping and MFA fatigue -- and how to mitigate them. Read More

The ultimate guide to mobile device security in the workplace

By John Powers 04 Apr 2024

Mobile devices provide connectivity for employees to access business data and communicate with colleagues, but these unique benefits come with specific security challenges for IT. Read More

IETF approves new weapon to fight spam, phish

By Dennis Fisher 24 May 2007

DomainKeys Identified Mail specification (DKIM) gained approval as an official IETF standard. The approval is seen as a major step in the fight against spam and phishing attacks. Read More

Meet the professional BEC op that targeted Microsoft 365 users for years

By Alex Scroxton 06 Sep 2023

The so-called W3LL cyber crime operation ran a phishing empire that has played a large role in compromising Microsoft 365 accounts for years. Its activities are now coming to light thanks to Group-IB researchers Read More