IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  

Email Spoofing

RSS Feed    Add to Google    Add to My Yahoo!
Email Spoofing White Papers (View All Report Types)
 
Preventing Attackers from Getting What They Want
sponsored by SecureAuth
WHITE PAPER: This white paper explores the anatomy of an attack and why preventative measures inevitably fail. Read on to learn how a two-factor authentication strategy limits the usefulness of any credentials that a hacker may have acquired or created.
Posted: 11 May 2015 | Published: 25 Mar 2015

SecureAuth

Stepping Up the Battle Against Advanced Threats
sponsored by IBM
WHITE PAPER: This essential white paper breaks down how application control can keep your endpoints secure in today's changing IT threat landscape.
Posted: 17 Sep 2013 | Published: 30 Aug 2013

IBM

Enhanced Mobile Endpoint Security
sponsored by ESET
WHITE PAPER: This white paper describes a mobile endpoint security system that gives you anti-theft protection, drive security, application control and more.
Posted: 11 Mar 2015 | Published: 11 Mar 2015

ESET

How to Prevent Security Breaches in Your Retail Network
sponsored by Dell, Inc.
WHITE PAPER: Explore the multi-vector nature common to most high-profile retail security breaches in this white paper and learn about the several common characteristics of recent breaches and how to protect your data against hackers.
Posted: 12 May 2015 | Published: 06 May 2015

Dell, Inc.

Phishing: The Latest Tactics And Potential Business Impacts
sponsored by Symantec
WHITE PAPER: This informative guide takes an in-depth look at phishing and how it has become an effective tactic for cybercriminals.
Posted: 14 May 2014 | Published: 14 May 2014

Symantec

Global Threat Research Report: Russia
sponsored by VeriSign, Inc
WHITE PAPER: This report takes an in-depth look at the security threat the Russian Business Network (RBN) is to North American-based enterprise businesses. Learn more about their current infrastructure, its corruption, and the impact the RBN has on business today.
Posted: 16 Nov 2007 | Published: 10 Jan 2007

VeriSign, Inc

Spam 2011: Protection Against Evolving Threats
sponsored by Proofpoint, Inc.
WHITE PAPER: The very best anti-spam solutions today de­liver 95% effectiveness. Unfortunately, that’s not good enough. Check out this white paper to see how enterprises can defend themselves with a comprehensive and adaptive anti-spam solution such as the Proofpoint Protection Suite.
Posted: 09 Mar 2011 | Published: 09 Mar 2011

Proofpoint, Inc.

Phishing 2.0 - Why Phishing is back as the No.1 threat, and how Web Security can protect your company
sponsored by Webroot
WHITE PAPER: This resource takes an inside look at the new dangers posed by phishing 2.0 attacks. Read on to find an overview of the structure of these threats, learn about web security and anti-phishing capabilities your organization needs, and much more.
Posted: 31 May 2013 | Published: 31 May 2013

Webroot

Symantec Intelligence Report - June 2013
sponsored by Symantec Corporation
WHITE PAPER: This Symantec Intelligence Report outlines the latest need-to-know security information on vulnerabilities, spam, phish, malware, and data breaches.
Posted: 13 Aug 2013 | Published: 28 Jun 2013

Symantec Corporation

The Trouble Heading for Your Business 2013
sponsored by Trend Micro
WHITE PAPER: This resource details the current state of targeted attacks and explores why putting an effective defensive strategy in place is so critical. View now to uncover the effects of these potentially disastrous attacks and what you can do to stay protected.
Posted: 16 Apr 2013 | Published: 28 Feb 2013

Trend Micro
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement