IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  

e-Mail Fraud

RSS Feed    Add to Google    Add to My Yahoo!
e-Mail Fraud White Papers (View All Report Types)
 
Research on Impostor Emails: Types, Targets, Threats, and More
sponsored by Proofpoint, Inc.
WHITE PAPER: This infographic reveals the facts about imposter emails based on recent research. Access now to learn what to look for in a phishing scheme and how to mitigate the threat.
Posted: 21 Apr 2016 | Published: 01 Mar 2016

Proofpoint, Inc.

Why Today's Phishing Attacks are Harder to Detect
sponsored by Proofpoint, Inc.
WHITE PAPER: Discover how to best protect your email gateway from phishing attacks and keep important information from being shared or exposed. Get clear visibility into all email using search and reporting capabilities to prioritize security incidents.
Posted: 06 Jun 2016 | Published: 01 May 2016

Proofpoint, Inc.

Best Practices for Dealing With Phishing and Ransomware
sponsored by Trustwave
WHITE PAPER: There are steps you can take to address phishing and ransomware. Discover how to best mitigate these tremendous threats to decrease the likelihood of infection and the subsequent consequences that come from them.
Posted: 21 Sep 2016 | Published: 30 Sep 2016

Trustwave

Beyond Spam - Email Security in the Age of Blended Threats
sponsored by EdgeWave
WHITE PAPER: In this paper, explore the new threat reality, including the tactics and designs cyber criminals are using today and uncover some of the next generation technologies that can help mitigate these threats.
Posted: 12 Mar 2012 | Published: 12 Mar 2012

EdgeWave

The Bot Threat
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defense-in-depth security system to prevent these attacks from compromising your networks.
Posted: 01 Feb 2015 | Published: 13 Nov 2013

Hewlett Packard Enterprise

Keep Your Customers Safe from Phishing
sponsored by Symantec Website Security Solutions
WHITE PAPER: This brief white paper presents one possible solution to the problem of phishing and helps you ensure the safety of your customers' data.
Posted: 20 Mar 2015 | Published: 31 Dec 2013

Symantec Website Security Solutions

Anti-Phishing: Best Practices for Institutions and Consumer
sponsored by Intel Security
WHITE PAPER: Phishing has become the most malicious form of spam, leaving both organizations and consumers vulnerable to financial losses and stolen information. Read this white paper to learn about best practices for protecting your company from phishing attacks.
Posted: 27 Mar 2007 | Published: 01 Nov 2005

Intel Security

Malware Analysts Have the Tools to Defend Against Cyber-Attacks, But Challenges Remain
sponsored by Threat Track Security
WHITE PAPER: This informative guide explores today's threat landscape, the role of malware and the threat of internal vulnerabilities.
Posted: 16 Jun 2014 | Published: 16 Jun 2014

Threat Track Security

Protecting Commercial Online Banking Customers from Next-Generation Malware
sponsored by IronKey
WHITE PAPER: Cybercriminals are now using advanced malicious software (malware) to attack the computers of finance professionals in companies and government agencies. Read this paper now to learn how your business can stay protected from these threats.
Posted: 22 Nov 2010 | Published: 22 Nov 2010

IronKey

Methods, Motivations, and Mitigation of Insider Threats
sponsored by VeriSign, Inc
WHITE PAPER: This white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
Posted: 28 Nov 2007 | Published: 13 Feb 2007

VeriSign, Inc
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement