IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  

Spear Phishing

RSS Feed    Add to Google    Add to My Yahoo!
Spear PhishingWhite Papers (View All Report Types)
 
Five Things To Do After You've Been Hacked
sponsored by Hexis Cyber Solutions Inc
WHITE PAPER: Access this informative guide to find out 5 things to do after you've been hacked – keeping your system safe and secure.
Posted: 22 May 2014 | Published: 22 May 2014

Hexis Cyber Solutions Inc

Symantec Intelligence Report – May 2013
sponsored by Symantec Corporation
WHITE PAPER: Keeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future.
Posted: 25 Jul 2013 | Published: 31 May 2013

Symantec Corporation

Symantec Intelligence Report - June 2013
sponsored by Symantec Corporation
WHITE PAPER: This Symantec Intelligence Report outlines the latest need-to-know security information on vulnerabilities, spam, phish, malware, and data breaches.
Posted: 13 Aug 2013 | Published: 28 Jun 2013

Symantec Corporation

The Personalisation Challenge: Business Culture and Mobile Security
sponsored by Hewlett-Packard Company
WHITE PAPER: This exclusive white paper reveals the truth about mobility in the workforce, including the risks and rewards of bring your own device (BYOD) for businesses.
Posted: 24 Sep 2013 | Published: 24 Sep 2013

Hewlett-Packard Company

Anti-Phishing Best Practices: Keys to Aggressively and Effectively Protecting Your Organization from Phishing Attacks
sponsored by Cyveillance
WHITE PAPER: Phishing has become one of the most common and effective online scams and can cost your company thousands of dollars. Download this new white paper and discover seven key objectives of an effective phishing protection and response plan.
Posted: 14 Nov 2006 | Published: 01 Apr 2006

Cyveillance

August Technical Guide on Authentication
sponsored by SearchSecurity.com
WHITE PAPER: This white paper can help you discover why attackers can target the token vendor to take advantage of the security of the authentication system as a whole and how you can replace the ubiquitous authenticator in your business.
Posted: 06 Aug 2012 | Published: 06 Aug 2012

SearchSecurity.com

First Annual Cost of Cyber Crime Study: Benchmark Study of U.S. Companies
sponsored by ArcSight, an HP Company
WHITE PAPER: The purpose of this benchmark study is twofold. First, we wanted to quantify the economic impact of a cyber attack. Second, we believed a better understanding of the cost of cyber crime will assist organizations in determining the appropriate amount of investment and resources needed to prevent or mitigate the devastating consequences of an attack.
Posted: 02 Aug 2010 | Published: 02 Aug 2010

ArcSight, an HP Company

Spam 2011: Protection Against Evolving Threats
sponsored by Proofpoint, Inc.
WHITE PAPER: The very best anti-spam solutions today de­liver 95% effectiveness. Unfortunately, that’s not good enough. Check out this white paper to see how enterprises can defend themselves with a comprehensive and adaptive anti-spam solution such as the Proofpoint Protection Suite.
Posted: 09 Mar 2011 | Published: 09 Mar 2011

Proofpoint, Inc.

Global Threat Research Report: Russia
sponsored by VeriSign, Inc
WHITE PAPER: This report takes an in-depth look at the security threat the Russian Business Network (RBN) is to North American-based enterprise businesses. Learn more about their current infrastructure, its corruption, and the impact the RBN has on business today.
Posted: 16 Nov 2007 | Published: 10 Jan 2007

VeriSign, Inc

Symantec Internet Security Threat Report: Trends for 2011
sponsored by Symantec Corporation
WHITE PAPER: This threat report takes a thorough look back at the most significant threats, trends and outright attacks of the year that was. Read now for helpful tips and best practices for keeping your confidential information safe.
Posted: 25 May 2012 | Published: 30 Apr 2012

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement