All resources sponsored by:

Proofpoint

12 Matches
Stopping BEC and EAC: Email Security in 2020
sponsored by Proofpoint
EBOOK:Email continues to be the leading vector in successful cyberattacks, leaving CISOs with the increasingly difficult responsibilities of protecting employee inboxes and stopping potential threats. Read this eBook for a comprehensive guide to stopping Business email compromise (BEC) and email account compromise (EAC) attacks.
Posted: 19 Nov 2020 | Published: 19 Nov 2020
Get This Now


Rethinking Insider Risk in the Gig Economy
sponsored by Proofpoint
EBOOK:By 2027, gig workers may account for half of the total U.S. workforce. It’s a major shift that comes with profound security implications. Some 87% of companies have suffered an incident with a third-party supplier that disrupted their operations, according to Deloitte. View this e-book to learn how to mitigate insider risk in the new work reality.
Posted: 18 Nov 2020 | Published: 30 Oct 2020
Get This Now


Demystifying BEC And EAC
sponsored by Proofpoint
WHITE PAPER:Learn how you can greatly reduce the chances of impostors reaching your users through business email compromise (BEC) and its close relative, email account compromise (EAC).
Posted: 18 Nov 2020 | Published: 18 Nov 2020
Get This Now

TOPICS:  Email | Security

Analyzing the Economic Benefits of Proofpoint Insider Threat Management
sponsored by Proofpoint
ANALYST REPORT:With cybersecurity talent in short supply, organizations have turned to technology to manage threats. SecOps and risk reduction have both been high on the list of priorities for security professionals, and now they may be able to take these functions a step further. Open this ESG report to learn about Insider Threat Management from Proofpoint.
Posted: 16 Oct 2020 | Published: 16 Oct 2020
Get This Now


The Role of Insider Threat Management Software Platforms
sponsored by Proofpoint
EBOOK:As workplace trends and cyberthreats evolve, so too should the methods used to mitigate risk and ensure user protection. This e-book takes a closer look at the growing risk of insider threats and explores the capabilities of the ObserveIT platform, Proofpoint’s insider threat management software platform.
Posted: 28 Jul 2020 | Published: 28 Jul 2020
Get This Now


Insider Threat Management and Cybersecurity Tools
sponsored by Proofpoint
EBOOK:The traditional notion of a perimeter is a thing of the past, people are the new perimeter. In this e-book, discover the tools and tactics organizations are using to defend against insider threats – evaluating the strengths and weaknesses of each approach and underlining the importance of people-centric security.
Posted: 28 Jul 2020 | Published: 28 Jul 2020
Get This Now


An Overview of Insider Threat Management
sponsored by Proofpoint
EBOOK:The average cost of an insider-caused cybersecurity incident has grown to $11.45 million – and these attacks are becoming more frequent, too. In this e-book, enhance your understanding of insider threats by looking at industry specific concerns, common use cases, the increasingly popular people-centric approach, and more.
Posted: 27 Jul 2020 | Published: 27 Jul 2020
Get This Now


A Guide to Setting Up Your Insider Threat Management Program
sponsored by Proofpoint
EBOOK:In this past 2 years, the average cost of insider threats grew to a devastating $11.45 million per incident (the frequency also increased too). Download this e-book to learn more about the varying types of insider threats, how to set up an insider threat management program, best practices, and more.
Posted: 27 Jul 2020 | Published: 27 Jul 2020
Get This Now


You've Got BEC!
sponsored by Proofpoint
EBOOK:BEC attacks have become bigger and costlier than ever. Toyota Boshoku, a subsidiary of the car manufacturer, lost $37 million to a BEC scam. Toyota is one of many companies that has suffered a loss from this type of email fraud. The good news? There is a layered approach to keep your email accounts and data safe. Open this e-book to learn more.
Posted: 08 Jul 2020 | Published: 08 Jul 2020
Get This Now


2020 Cost of Insider Threats Global report
sponsored by Proofpoint
ANALYST REPORT:Each year, the Ponemon Institute conducts a study, known as the Cost of Insider Threats Global Report study, to dissect and examine the costs (direct and indirect) that result from insider threats. Download the report to explore the results of the 2020 study.
Posted: 22 Jun 2020 | Published: 22 Jun 2020
Get This Now


Looking within: The Hidden Costs of Insider Threats
sponsored by Proofpoint
RESOURCE:Whether it’s careless users, disgruntled employees or compromised accounts, the cost of insider threats is on the rise. The infographic provides a closer look at the statistics and insights regarding the dangers of insider threats. Download now to learn more.
Posted: 18 Jun 2020 | Published: 18 Jun 2020
Get This Now


Cyber Insecurity: Managing Threats from Within
sponsored by Proofpoint
WHITE PAPER:Data breaches are having increasingly disastrous consequences for business. Explore the frequency and severity of people-centric data breaches in this Cyber Insecurity: Managing Threats from Within white paper.
Posted: 09 Oct 2019 | Published: 09 Oct 2019
Get This Now


12 Matches
Page: 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info