Book chapter: Unified Communications Forensics

Social media security risks and real-time communication security

Email Alerts

Register now to receive SearchSecurity.com-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • Unified Communications Forensics: Anatomy of Common UC Attacks

    In this excerpt from Unified Communications Forensics, learn how hackers gain access into UC systems and how to scan the network for vulnerabilities. 

  • Social Media Security

    In this excerpt from Social Media Security, author Michael Cross offers a number of strategies to help ensure social media security. 

  • Book chapter: Social media security policy best practices

    The following is an excerpt from chapter 6 Gary Bahadur from the book Securing the clicks: Network security in the age of social media. 

  • Mitigating Web 2.0 threats

    As companies look to cut costs, Software as a Service has gained ground in the enterprise. Similarly, social networking sites like Facebook and LinkedIn are must-haves in today's workplace. David Sherry reviews how to secure these services and defend... 

  • Quiz: Secure instant messaging

    A five-question multiple choice quiz to test your understanding of the content presented in the Secure instant messaging lesson of SearchSecurity.com's Messaging Security School.