IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Email Security

RSS Feed   
ALSO CALLED: e-Mail Security, E Mail Security, Secure Email
DEFINITION: Vouch By Reference (VBR) is a protocol for adding third-party certification to email. The protocol has two parts, one for the sender and one for the receiver. The first part of the protocol requires the sender to add information to their email header by creating a field called VBR-Info. The information in the field tells the receiver three things: The sender's domain.The type of content the message  … 

Email Security definition sponsored by SearchExchange.com, powered by WhatIs.com an online computer dictionary
Email Security Multimedia (View All Report Types)
1 - 25 of 35 Matches Previous Page  |  Next Page
Okta + Proofpoint: Phishing Security and Response
sponsored by Okta
WEBCAST: For more than 80% of breaches caused by compromised credentials; attackers don’t need to hack in – they can just log in. So how can organizations protect against attacks like phishing? Learn more in this webinar.
Posted: 24 Mar 2020 | Premiered: Mar 24, 2020

Okta

Webinar: BEC Attacks Are the Costliest Form of Phishing
sponsored by PhishLabs
WEBCAST: Business Email Compromise (BEC) attacks are quickly becoming the costliest and least detectible form of phishing attacks. They occur when a scammer impersonates a trusted individual to exploit relationships via email. So, what can your organization do to prevent these attacks? Watch this webinar to find out.
Posted: 19 Feb 2020 | Premiered: Feb 19, 2020

PhishLabs

Handling Threats That Land in User Inboxes
sponsored by PhishLabs
WEBCAST: Traditionally, phishing is associated with email-based attacks containing malicious links. However, 98% of modern phishing attacks that reach users don’t contain any sort of malware. So, how can your organization be better prepared against modern threats? Watch this webinar to learn more.
Posted: 19 Feb 2020 | Premiered: Feb 19, 2020

PhishLabs

Webinar: Proactively Protect Users with Email Incident Response
sponsored by PhishLabs
WEBCAST: Phishing attacks are growing in their frequency, and the damage caused by these campaigns is increasingly costly. It’s more critical than ever for security leaders to reconsider how they approach phishing detection. In this webinar, discover the key characteristics of an effective program and view a demo of PhishLabs’ Email Incident Response.
Posted: 18 Feb 2020 | Premiered: Feb 18, 2020

PhishLabs

What is the CCPA & How Will it Affect Email Security?
sponsored by Egress Software Technologies Inc
VIDEO: This video explains the the significance and implications of California’s new data privacy regulations, specifically focusing on how they will affect email use among employees. Watch now to learn more.
Posted: 04 Feb 2020 | Premiered: 08 Nov 2019

Egress Software Technologies Inc

Core - DNS - The Big Easy - 3 steps to better security
sponsored by Cisco Umbrella
WEBCAST: When it comes to cybersecurity, there are 3 main ‘ways’ in which data breaches occur. In this webinar, take a closer look at the top challenge areas facing IT security teams, and discover the 3 methods in which attacks happen & how to stop them.
Posted: 03 Feb 2020 | Premiered: Dec 11, 2019

Cisco Umbrella

Introducing Egress Risk-based Protection
sponsored by Egress Software Technologies Inc
VIDEO: When it comes to email protection, traditional ‘one-size-fits-all approaches are incapable of recognizing the increasingly sophisticated attacks & risks. In this video, take a closer look at Egress’ Risk-based Protection for email security and discover how it can help you identify & mitigate today’s risks.
Posted: 03 Feb 2020 | Premiered: 02 May 2019

Egress Software Technologies Inc

Taking A “Prevent and Protect” Approach to Insider Data Breaches
sponsored by Egress Software Technologies Inc
VIDEO: As cyberattacks become occur more frequently than ever, organizations need to ensure their security efforts are focused on protecting from both external & internal threats. In this video, join the CPO of Egress in an overview of how an email security strategy can enhance regulatory compliance, reduce costs & increase profitability.
Posted: 03 Feb 2020 | Premiered: 23 Oct 2019

Egress Software Technologies Inc

Spear-phishing Analysis with ThreatQ Investigations
sponsored by ThreatQuotient
WEBCAST: Spear-phishing attacks are a growing security threat to organizations and their employees. These attacks target victims from a seemingly reliable source to lure them to a malware-ridden site. View this webinar to learn how to develop your spear-phishing investigation skills to spot an and attack before it becomes troublesome.
Posted: 23 Jan 2020 | Premiered: Jan 23, 2020

ThreatQuotient

The 5 Most Dangerous New Attack Techniques: Are They Evolving?
sponsored by RSA Conference
WEBCAST: Each year at RSAC, SANS Institute reveals the most dangerous new attack techniques. On the list for 2019 were smartphone attacks, DNS manipulation, domain fronting, cloud-on-cloud attacks, CPU flaws and more. Watch this RSAC webcast to see the full—and accurate—list, plus the best methods to defeat these attacks.
Posted: 22 Jan 2020 | Premiered: Nov 19, 2019

RSA Conference

Protecting the Institution: IRONSCALES & Dalton State Success Story
sponsored by Ironscales
VIDEO: In the wake of an email phishing attack in 2017, Dalton State College set out to implement an email security platform that would better equip them to handle future attacks. This success story recaps how Dalton State’s partnered with IRONSCALES to protect their email user from phishing threats.
Posted: 20 Jan 2020 | Premiered: 02 Dec 2019

Ironscales

Your Email Security is Ineffective and Getting Worse
sponsored by Ironscales
WEBCAST: The effects of an email phishing attack are increasingly damaging. With current tactics ineffective at detecting these attacks, organizations need to rethink their approach to email security to meet modern threats. In this webinar, uncover key insights from a recent Aberdeen study and uncover tactics for building an effective strategy.
Posted: 20 Jan 2020 | Premiered: Oct 25, 2019

Ironscales

Guide to Eliminating the Top 3 Security Pain Points
sponsored by Menlo Security
WEBCAST: In this webinar, leverage the knowledge of industry experts at 451 research and Menlo Security to uncover the most significant information security pain points and strategic recommendations for eliminating them.
Posted: 26 Nov 2019 | Premiered: Sep 26, 2019

Menlo Security

Natural Language Understanding (NLU): A New Way to Fight Cyberattacks
sponsored by Armorblox
WEBCAST: In this webcast, listen as Garret Bekker from 451 Research and Anand Raghavan from Armorblox discuss the email threat landscape and how Armorblox leverages deep learning and natural language understanding to deliver more comprehensive and accurate data security.
Posted: 26 Aug 2019 | Premiered: Aug 26, 2019

Armorblox

How Internet Isolation Eliminates Threats That Evade Sandboxes
sponsored by Menlo Security
WEBCAST: Many organizations rely on a sandbox to protect against sophisticated email or malware threats. However, attackers have now figured out how to outsmart sandboxes and design attacks that appear normal to evade detection. In this webinar, Vinay Pidathala will discuss these techniques and how to defend against them using Internet Isolation.
Posted: 25 Jul 2019 | Premiered: Jul 25, 2019

Menlo Security

The Top Industries at Risk for Cyber Attacks
sponsored by Barracuda
VIDEO: This webinar identifies 4 industries that are at a heightened risk of cyber-attacks, dissects the anatomy of an attack, and demonstrates how to defend your firm and your customers using AI.
Posted: 29 May 2019 | Premiered: 31 Dec 2018

Barracuda

Email Protection with Asaf Cidon
sponsored by Barracuda
VIDEO: Asaf Cidon, VP of Email Protection at Barracuda, will highlight how to combat these new threats and improve your email security posture in this video. Tune in for tactical guidance on preventing damage to your brand and fending off attackers that would otherwise harvest your sensitive information.
Posted: 29 May 2019 | Premiered: 01 Mar 2019

Barracuda

An Overview of Barracuda PhishLine
sponsored by Barracuda
VIDEO: The following video will help you prepare for a range of threats with patented, highly-variable attack simulations for multiple vectors—including phishing, smishing, vishing, and found physical media. View it now to learn how to put them to use in your organization.
Posted: 28 May 2019 | Premiered: 08 Feb 2019

Barracuda

Barracuda Lightboard: Total Email Protection
sponsored by Barracuda
VIDEO: This video discusses the evolution of advanced email threats, so tune in to learn how to establish multi-layered protection to thwart them before they infiltrate your organization.
Posted: 28 May 2019 | Premiered: 31 Jan 2019

Barracuda

Inner Workings of Ransomware and Ways to Detect and Respond
sponsored by Arctic Wolf
VIDEO: Ransomware hacks can bypass your perimeter controls and infect your critical systems, brining your business to a halt. Unfortunately, focusing on prevention technologies, with point security products, may not be sufficient enough to fight these key security concerns. This webinar contains key insights on a ransomware cyber kill chain.
Posted: 07 Dec 2018 | Premiered: 31 Dec 2018

Arctic Wolf

Symantec Data Loss Prevention for Mobile
sponsored by Symantec Corporation
WEBCAST: This webcast introduces the highest-rated DLP solution with industry-leading detection technology.
Posted: 27 Jun 2014 | Premiered: Jun 27, 2014

Symantec Corporation

How to Limit the Risk of Attack on your XP Assets
sponsored by AT&T Cybersecurity
WEBCAST: This webinar describes the new threats facing organizations that are still using Windows XP now that support for the operating system has ended. It also highlights a solution that can be implemented to make sure Windows XP assets remain protected.
Posted: 08 May 2014 | Premiered: May 8, 2014

AT&T Cybersecurity

Sophos EndUser Protection Overview
sponsored by Sophos
VIDEO: This two-minute video details an endpoint security solution that makes it easy to protect your end-users, regardless of which device – or how many devices – they leverage.
Posted: 09 May 2013 | Premiered: 10 Jan 2013

Sophos

Death and Taxes...and Hackers
sponsored by Imperva
VIDEO: View this video to learn about a tax scheme that is sweeping through the internet, and how to avoid falling victim to it.
Posted: 01 Apr 2011 | Premiered: 01 Apr 2011

Imperva

Trend Micro Hosted Email Security
sponsored by Trend Micro
PRODUCT DEMO: Trend Micro Hosted Email Security is independently rated #1 for anti-spam as it blocks 99% of spam 100% of the time. Download a FREE trial version.
Posted: 21 Apr 2010 | Premiered: 14 Apr 2010

Trend Micro
1 - 25 of 35 Matches Previous Page    1 2    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info