IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  

Brand Spoofing

RSS Feed    Add to Google    Add to My Yahoo!
Brand SpoofingReports
 
E-Guide: New Malware Threats Require New Antimalware Protection Strategy
sponsored by SearchSecurity.com
EGUIDE: This expert e-guide examines emerging threats and malware that are targeting smartphones, mobile apps, social media, and cloud services. Inside, discover essential strategies and best practices for mitigating these risks and ensuring enterprise security.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

SearchSecurity.com

Information security trends
sponsored by ComputerWeekly.com
RESEARCH CONTENT: This report from CompTIA, based on original research, assesses the current trends in information security.
Posted: 11 Mar 2013 | Published: 11 Mar 2013

ComputerWeekly.com

Information security breaches survey 2012
sponsored by ComputerWeekly.com
IT BRIEFING: Rising security breaches cost UK billions over the last 12 months as cyber attacks reached record levels, according to the 2012 Information Security Breaches survey.
Posted: 24 Apr 2012 | Published: 24 Apr 2012

ComputerWeekly.com

Spam 2011: Protection Against Evolving Threats
sponsored by Proofpoint, Inc.
WHITE PAPER: The very best anti-spam solutions today de­liver 95% effectiveness. Unfortunately, that’s not good enough. Check out this white paper to see how enterprises can defend themselves with a comprehensive and adaptive anti-spam solution such as the Proofpoint Protection Suite.
Posted: 09 Mar 2011 | Published: 09 Mar 2011

Proofpoint, Inc.

Who Is Fighting Phishing: An Overview of the Phishing Lifecycle and the Entities Involved
sponsored by MarkMonitor
WHITE PAPER: This white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites.
Posted: 10 Oct 2008 | Published: 09 Oct 2008

MarkMonitor

Threatsaurus: The A-Z of Computer and Data Security Threats
sponsored by Sophos UK
BOOK: Whether you're an IT professional, use a computer at work, or just browse the internet, this book is for you. We tell you the facts about the threats to your computers and to your data in simple, easy-to-understand language.
Posted: 25 May 2010 | Published: 01 Dec 2009

Sophos UK

Global Threat Research Report: Russia
sponsored by VeriSign, Inc
WHITE PAPER: This report takes an in-depth look at the security threat the Russian Business Network (RBN) is to North American-based enterprise businesses. Learn more about their current infrastructure, its corruption, and the impact the RBN has on business today.
Posted: 16 Nov 2007 | Published: 10 Jan 2007

VeriSign, Inc

An Introduction to Security Assertion Markup Language (SAML) & Internet Single Sign-On
sponsored by Ping Identity Corporation
VIDEOCAST: Check out this videocast to learn about Security Assertion Markup Language (SAML): what it is, how it works, and why it's important.
Posted: 11 Aug 2009 | Premiered: Aug 11, 2009

Ping Identity Corporation

August Technical Guide on Authentication
sponsored by SearchSecurity.com
WHITE PAPER: This white paper can help you discover why attackers can target the token vendor to take advantage of the security of the authentication system as a whole and how you can replace the ubiquitous authenticator in your business.
Posted: 06 Aug 2012 | Published: 06 Aug 2012

SearchSecurity.com

Symantec Intelligence Report – May 2013
sponsored by Symantec Corporation
WHITE PAPER: Keeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future.
Posted: 25 Jul 2013 | Published: 31 May 2013

Symantec Corporation
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement