All resources sponsored by:

Proofpoint, Inc.

10 Matches
The Impostor in the Machine: Understanding the Motives and Mayhem Behind Impostor Emails
sponsored by Proofpoint, Inc.
WHITE PAPER:In this white paper, learn how hackers evade current email filtering security strategies to dupe high-level employees and steal data. Read on to learn how next-gen email security strategies enable you to quarantine imposter emails before they reach the inbox and discover several proven defense strategies.
Posted: 28 Apr 2016 | Published: 28 Apr 2016
Get This Now


The human factor research report 2016
sponsored by Proofpoint, Inc.
WHITE PAPER:This white paper takes an in-depth look at today's socially engineered attacks, like phishing scams, to help you take action against the wide range of threats. Access now to learn how you can deploy automated incident response capabilities to quickly identify infections.
Posted: 26 Apr 2016 | Published: 01 Mar 2016
Get This Now


How Credential Phishing is Changing - How to Stop It
sponsored by Proofpoint, Inc.
WHITE PAPER:This white paper teaches you the anatomy of a phishing attack and why they are so effective. Access now to learn how today's phishing attacks are concocted so you can better spot them before they cause long lasting harm to your organization.
Posted: 26 Apr 2016 | Published: 01 Mar 2016
Get This Now


A Guide to Corporate Social Media Security
sponsored by Proofpoint, Inc.
WHITE PAPER:This white paper helps you understand this new kind of attack and develop a plan to protect your organization's reputation.
Posted: 25 Apr 2016 | Published: 01 Mar 2016
Get This Now


Impostor Email Threats infographic
sponsored by Proofpoint, Inc.
WHITE PAPER:This infographic shows you some stats and facts about imposter emails research conducted on organizations across industries. Access now to learn what to look for in a phishing scheme and how to mitigate the threat.
Posted: 21 Apr 2016 | Published: 01 Mar 2016
Get This Now


Impostor Email Threats eBook
sponsored by Proofpoint, Inc.
EBOOK:This white paper shows you what to looks for and how to block email attacks.
Posted: 21 Apr 2016 | Published: 01 Mar 2016
Get This Now


Hook, Line, and Sinker: How Credential Phishing is Changing
sponsored by Proofpoint, Inc.
WHITE PAPER:Find out the facts about phishing attacks and a 4-step strategy to stop them.
Posted: 04 Apr 2016 | Published: 30 Mar 2016
Get This Now


Email Phishing: The Impostor in the Machine
sponsored by Proofpoint, Inc.
WHITE PAPER:In this white paper, learn how hackers evade current email filtering security strategies to dupe high-level employees and steal data. Read on to learn how next-gen email security strategies enable you to quarantine imposter emails before they reach the inbox
Posted: 04 Apr 2016 | Published: 16 Mar 2016
Get This Now


Spearphishing Survival Guide: How to Stop Advanced Email Attacks
sponsored by Proofpoint, Inc.
WHITE PAPER:This white paper discusses how to guard against advanced spearphishing with email analysis tools and third-party intelligence. Read on to access a checklist to help you evaluate your email security system.
Posted: 01 Apr 2016 | Published: 31 Dec 2015
Get This Now


The Human Risk Factor Infographic
sponsored by Proofpoint, Inc.
WHITE PAPER:This brief infographic lists the 9 things you need to know about human error exploits today and offers defensive insight to protect your organization and users.
Posted: 01 Apr 2016 | Published: 23 Mar 2016
Get This Now


The Human Factor Report
sponsored by Proofpoint, Inc.
WHITE PAPER:This white paper teaches you how to take action against the wide range of advanced threats. View now and learn how to identify and block targeted attacks that travel over email and other threat vectors.
Posted: 29 Mar 2016 | Published: 31 Dec 2015
Get This Now


10 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement