IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  

Brand Spoofing

RSS Feed    Add to Google    Add to My Yahoo!
Brand Spoofing Reports
 
Case Study: Mitigate Email APTs in the Cloud
sponsored by Proofpoint, Inc.
CASE STUDY: Learn how H-E-B, a San Antonio based supermarket chain, eliminated false positive message classification and improved email security against APTs in the cloud.
Posted: 15 Oct 2015 | Published: 23 Sep 2015

Proofpoint, Inc.

How Cybercriminals Exploit the Human Factor
sponsored by Proofpoint, Inc.
WHITE PAPER: This report explores data on end-user behavior and how it contributes to security incidents. Take a look to learn why your users click on malicious links and how you can put a stop to their dangerous behavior.
Posted: 21 Oct 2015 | Published: 21 Oct 2015

Proofpoint, Inc.

Respond to Any Attack with Deep Network Insights
sponsored by Proofpoint, Inc.
VIDEO: This video examines how deep insights into your network can keep you safe no matter what your users let in. Watch and discover how you can respond to an attack across any device before it can do any harm.
Posted: 30 Dec 2015 | Premiered: 28 Oct 2015

Proofpoint, Inc.

How Bad Can Adversaries Get?: Examining the Hacker's Evolution Over Time
sponsored by WhiteHat Security
WEBCAST: This webcast examines how hackers are evolving their techniques to achieve their goals faster and undetected, as well as the top 10 attacks they're using. Learn how a risk-based approach prioritizes vulnerabilities differently than the "high, medium, low" strategy and why it's imperative to make the switch.
Posted: 01 Oct 2015 | Premiered: May 6, 2015

WhiteHat Security

E-Guide: New Malware Threats Require New Antimalware Protection Strategy
sponsored by SearchSecurity.com
EGUIDE: This expert e-guide examines emerging threats and malware that are targeting smartphones, mobile apps, social media, and cloud services. Inside, discover essential strategies and best practices for mitigating these risks and ensuring enterprise security.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

SearchSecurity.com

Spear Phishing: The Secret Weapon Behind The Worst CyberAttacks
sponsored by Cloudmark
RESOURCE: Don't underestimate spear phishing attacks as this infographic lays out the severe impact of the 10 worst cyberattacks and presents the revenue losses suffered. View now to learn from these previous attacks and protect your business's reputation from the damages these organizations faced.
Posted: 18 Jan 2016 | Published: 06 Jan 2016

Cloudmark

The Impact of Spear Phishing: Enterprise Survey Findings
sponsored by Cloudmark
VIDEO: In this informative video, you'll hear from cyber security expert Morgan Wright and Cloudmark's SVP of engineering Leon Rishniw as they discuss the impacts of spear phishing. Tune in for details on how you can defend the enterprise against this expanding threat.
Posted: 22 Jan 2016 | Premiered: 13 Jan 2016

Cloudmark

Presentation Transcript: How Google Tackles IT Security and What You Can Learn from It
sponsored by Google Apps
PRESENTATION TRANSCRIPT: Today's computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to incidents.
Posted: 19 Jan 2011 | Published: 19 Jan 2011

Google Apps

Symantec Internet Security Threat Report: Trends for 2011
sponsored by Symantec Corporation
WHITE PAPER: This threat report takes a thorough look back at the most significant threats, trends and outright attacks of the year that was. Read now for helpful tips and best practices for keeping your confidential information safe.
Posted: 25 May 2012 | Published: 30 Apr 2012

Symantec Corporation

The Bot Threat
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defense-in-depth security system to prevent these attacks from compromising your networks.
Posted: 01 Feb 2015 | Published: 13 Nov 2013

Hewlett Packard Enterprise
 
 
Visit WhatIs.com - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2016, TechTarget | Read our Privacy Statement