IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  

Spear Phishing

RSS Feed    Add to Google    Add to My Yahoo!
Spear PhishingWhite Papers (View All Report Types)
 
Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This Internet Security Threat Report details the issues related to online fraud and examines current trends in the internet security landscape. Read this paper today and learn about the future of internet attacks and what to expect in the coming years.
Posted: 30 Mar 2007 | Published: 01 Mar 2007

Symantec Corporation

The Trouble Heading for Your Business 2013
sponsored by Trend Micro
WHITE PAPER: This resource details the current state of targeted attacks and explores why putting an effective defensive strategy in place is so critical. View now to uncover the effects of these potentially disastrous attacks and what you can do to stay protected.
Posted: 16 Apr 2013 | Published: 28 Feb 2013

Trend Micro

Top Benefits of Symantec Protection Suite
sponsored by Symantec Corporation
WHITE PAPER: Anti-virus is not enough to protect your organization. Symantec now offers multi-layered protection from endpoint to gateway in the new Symantec Protection Suite. Download this paper to find out 10 reasons that this new product suite is the one you can trust for your organization.
Posted: 09 Jun 2009 | Published: 09 Jun 2009

Symantec Corporation

Protecting the Windows Environment: A Blueprint for Small and Mid-sized Organizations
sponsored by Symantec Corporation
WHITE PAPER: Many companies rely on a Microsoft® Windows® environment. But many fail to recognize the vulnerabilities in Windows based systems. Explore the challenges and learn about a strategy for mitigating risk without adding cost and complexity.
Posted: 25 Oct 2006 | Published: 01 Oct 2006

Symantec Corporation

The Bot Threat
sponsored by Hewlett-Packard Limited
WHITE PAPER: In this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defence-in-depth security system to prevent these attacks from compromising your networks.
Posted: 13 May 2014 | Published: 30 Nov 2012

Hewlett-Packard Limited

Phishing and Web Security
sponsored by Webroot
WHITE PAPER: This brief whitepaper explores why businesses need to prepare for phishing 2.0 and why this new cybercrime is aiming its sights at your business.
Posted: 29 Apr 2014 | Published: 31 Dec 2013

Webroot

IBM X-Force 2013 Mid-Year Trend and Risk Report
sponsored by IBM
WHITE PAPER: In this detailed white paper, explore this year's report on the latest risks and security challenges organizations are facing today, and offers best practices to boost security fundamentals and policies to meet these advanced persistent threats (APTs).
Posted: 06 Nov 2013 | Published: 30 Sep 2013

IBM

Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
sponsored by Symantec Corporation
WHITE PAPER: This white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.
Posted: 30 Mar 2007 | Published: 01 Jan 2006

Symantec Corporation

 Safer web browsing in four steps
sponsored by Sophos, Inc.
WHITE PAPER: Accessing the web poses enormous risks, yet you can’t afford to be isolated from the internet and its resources. This white paper examines the latest web threats, and recommends four best practices and a layered approach that enables your users while also protecting your organization’s endpoints, network and data.
Posted: 05 Oct 2010 | Published: 04 Oct 2010

Sophos, Inc.

Methods, Motivations, and Mitigation of Insider Threats
sponsored by VeriSign, Inc
WHITE PAPER: This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
Posted: 28 Nov 2007 | Published: 13 Feb 2007

VeriSign, Inc
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement