IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  

Social Engineering

RSS Feed   
DEFINITION: Pretexting is a form of social engineering in which an individual lies about his identity or purpose to obtain privileged data about another individual. A pretexter may then use this data to engage in identity theft or corporate espionage. Pretexting may be employed by telephone or email, through customer service instant messaging or a company Web site. A pretexter may use a variety of strategies  … 

Social Engineering definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary
Social Engineering Multimedia (View All Report Types)
 
Cryptomining - How Cryptocurrency is Changing Cyber Security
sponsored by Cisco Umbrella
WEBCAST: The introduction of cryptocurrencies has changed the cyber threat landscape. New varieties of ransomware in the form of cryptojacking, mining, and exchange phishing are plaguing today’s businesses. In this episode of ‘A Cybersecurity Technical Mini Series’, learn how you can stay protected.
Posted: 13 Feb 2020 | Premiered: Dec 16, 2019

Cisco Umbrella

Introducing Egress Risk-based Protection
sponsored by Egress Software Technologies Inc
VIDEO: When it comes to email protection, traditional ‘one-size-fits-all approaches are incapable of recognizing the increasingly sophisticated attacks & risks. In this video, take a closer look at Egress’ Risk-based Protection for email security and discover how it can help you identify & mitigate today’s risks.
Posted: 03 Feb 2020 | Premiered: 02 May 2019

Egress Software Technologies Inc

RSA 2020 Anatomy of a Ransomware Attack in the Cloud
sponsored by Spin Tech
VIDEO: Ransomware has evolved to attack cloud services, including Office 265 and the G-suite. This video from RSA 2020 provides a detailed breakdown of the anatomy of modern ransomware attacks – including how they target cloud services. Watch now to learn more about how ransomware attacks work.
Posted: 19 Jun 2020 | Premiered: 26 Feb 2020

Spin Tech

Beyond the Headlines: How is the Pandemic Really Changing Cyberattacks?
sponsored by CI Security
WEBCAST: The spread of the Coronavirus has affected nearly every aspect of our lives, so it should come as no surprise that cyberattackers are taking full advantage. In this webinar, leverage the expertise of an industry expert as they highlight vulnerable areas hackers target most often and offer best practices for mitigating these threats.
Posted: 20 Apr 2020 | Premiered: Apr 20, 2020

CI Security

Inspecting a Phishing Campaign using Cisco Talos
sponsored by Cisco Umbrella
VIDEO: Join this video demo as security experts look into a phishing campaign that was set up to phish users’ credentials by leveraging interest in the global pandemic.
Posted: 26 Jun 2020 | Premiered: 26 Jun 2020

Cisco Umbrella

Evolution of Email Security
sponsored by Barracuda
WEBCAST: Ever since it became a critical tool for business communications, email has been the target of increasingly sophisticated cyberattacks. In this webinar, join Barracuda security experts as they overview the evolution of email security from early inbox threats to campaigns taking advantage of the current pandemic.
Posted: 04 May 2020 | Premiered: May 4, 2020

Barracuda

Securing a Remote Workforce
sponsored by ProAct
WEBCAST: As people connect to their work VPNs via their home networks, there are more holes in security and greater vulnerability to attack. According to Barracuda Networks, email phishing went up 600% in the month of March. Watch this webinar for an in-depth look at cyberthreats – and what you can do to fight back.
Posted: 25 Jun 2020 | Premiered: Apr 8, 2020

ProAct

Okta + Proofpoint: Phishing Security and Response
sponsored by Okta
WEBCAST: For more than 80% of breaches caused by compromised credentials; attackers don’t need to hack in – they can just log in. So how can organizations protect against attacks like phishing? Learn more in this webinar.
Posted: 24 Mar 2020 | Premiered: Mar 24, 2020

Okta

Death and Taxes...and Hackers
sponsored by Imperva
VIDEO: View this video to learn about a tax scheme that is sweeping through the internet, and how to avoid falling victim to it.
Posted: 01 Apr 2011 | Premiered: 01 Apr 2011

Imperva

An Introduction to Security Assertion Markup Language (SAML) & Internet Single Sign-On
sponsored by Ping Identity Corporation
VIDEOCAST: Check out this videocast to learn about Security Assertion Markup Language (SAML): what it is, how it works, and why it's important.
Posted: 11 Aug 2009 | Premiered: Aug 11, 2009

Ping Identity Corporation
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info