716 Results for:SPAM
- Sort by:
Allowlisting vs. blocklisting: Benefits and challenges
17 Oct 2023Allowlisting and blocklisting are key components of access control. Learn the benefits and challenges of each approach and why a combination of the two is often the best strategy. Read More
Using generative AI to improve VoIP communications
12 Sep 2023Generative AI has the potential to dramatically reshape how companies manage their VoIP communications. A more intelligent chatbot could do a lot of wonders. Read More
Authentication takes a bite out of spam
24 Jul 2005Network and messaging experts offer helpful ammunition for network managers waving the white flag in the battle against spam. Read More
Security pros grumble over spam increase
02 Jan 2007Spim and spam from unexpected sources is challenging enterprises in 2007. Some enterprises are taking action. Read More
Latest ONS data shows that 10% of UK businesses plan to adopt AI
16 Jun 2023The Office for National Statistics has found that UK adults are aware they have been using AI-based chatbots, and approximately one in six businesses are implementing AI applications Read More
U.S. data privacy protection laws: 2024 guide
20 Mar 2024Concerns about how personal data is processed and stored is leading to the passage of new privacy regulations that govern how companies handle consumer data. Read More
How to solve 2 MFA challenges: SIM swapping and MFA fatigue
01 Dec 2023While MFA improves account security, attacks still exploit it. Learn about two MFA challenges -- SIM swapping and MFA fatigue -- and how to mitigate them. Read More
The ultimate guide to mobile device security in the workplace
04 Apr 2024Mobile devices provide connectivity for employees to access business data and communicate with colleagues, but these unique benefits come with specific security challenges for IT. Read More
IETF approves new weapon to fight spam, phish
24 May 2007DomainKeys Identified Mail specification (DKIM) gained approval as an official IETF standard. The approval is seen as a major step in the fight against spam and phishing attacks. Read More
Meet the professional BEC op that targeted Microsoft 365 users for years
06 Sep 2023The so-called W3LL cyber crime operation ran a phishing empire that has played a large role in compromising Microsoft 365 accounts for years. Its activities are now coming to light thanks to Group-IB researchers Read More