IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  

Email Fraud

RSS Feed   
Email Fraud White Papers (View All Report Types)
 
3 Indicators to Monitor for Business Email Compromise (BEC)
sponsored by CI Security
WHITE PAPER: Since March 2020, cybercriminals have been exploiting email inboxes at an unprecedented rate with 19-related phishing attacks and business email compromise (BEC) scams. This white paper identifies the 3 most common indicators of a BEC attack, the FBI’s list of BEC red flags, and best practices for lowering your risk.
Posted: 17 Jul 2020 | Published: 17 Jul 2020

CI Security

Business Email Compromise: The Catalyst for Mailbox Level Email Security
sponsored by Ironscales
WHITE PAPER: As phishing attack grow in sophistication, organizations must establish security protocols to meet these evolving threats. One emerging threat is business email compromise (BEC), which affects more than 500 businesses per day. In this white paper, go in-depth into BEC, what makes it so successful and how organizations can mitigate the risks.
Posted: 13 Jan 2020 | Published: 13 Jan 2020

Ironscales

2020 State of Phish
sponsored by Proofpoint
WHITE PAPER: Along with immediate effects, successful phishing attacks have the most impact on an organization’s bottom line. Over recent years, security experts have been able to gather information to develop tactics for identifying and mitigating phishing attacks. Download this report to get a closer look at the current state of phishing.
Posted: 28 Feb 2020 | Published: 28 Feb 2020

Proofpoint

Cybercrime Tactics and Techniques: Ransomware Retrospective
sponsored by Malwarebytes
WHITE PAPER: In this edition of Cybercrime Tactics and Techniques, take an in-depth look into ransomware attacks over the past few years – attack methods, common targets and notable subcategories. In addition, this report will consider where ransomware will go next, and how to prepare. Read on to reveal the full report.
Posted: 21 Jan 2020 | Published: 31 Aug 2019

Malwarebytes

The Definitive Email Security Strategy Guide: A People-Centric Approach
sponsored by Proofpoint
WHITE PAPER: With 94% of external cyber threats start with email, organizations need to ensure that their email security strategy can keep pace with this growing threat landscape. This white paper explores a new, people-centric approach to email security and provides you with a comprehensive guide for implementing this approach (including a checklist).
Posted: 05 Jun 2020 | Published: 05 Jun 2020

Proofpoint

Top Security Orchestration Use Cases
sponsored by Palo Alto Networks
WHITE PAPER: As security alert volumes reach an all-time high, analysts are often left feeling overworked or fatigued. To help with the SecOps workload, organizations have begun adopting security orchestration as a way of unifying disparate security tools and teams. But what is security orchestration and how does it help? Read on to find out.
Posted: 18 Nov 2020 | Published: 18 Nov 2020

Palo Alto Networks

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This Internet Security Threat Report details the issues related to online fraud and examines current trends in the internet security landscape. Read this paper today and learn about the future of internet attacks and what to expect in the coming years.
Posted: 30 Mar 2007 | Published: 01 Mar 2007

Symantec Corporation

The Bot Threat
sponsored by Hewlett-Packard Enterprise
WHITE PAPER: In this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defence-in-depth security system to prevent these attacks from compromising your networks.
Posted: 13 May 2014 | Published: 30 Nov 2012

Hewlett-Packard Enterprise

Who Is Fighting Phishing: An Overview of the Phishing Lifecycle and the Entities Involved
sponsored by MarkMonitor
WHITE PAPER: This white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites.
Posted: 10 Oct 2008 | Published: 09 Oct 2008

MarkMonitor

Phishing 2.0 - Why Phishing is back as the No.1 threat, and how Web Security can protect your company
sponsored by Webroot
WHITE PAPER: This resource takes an inside look at the new dangers posed by phishing 2.0 attacks. Read on to find an overview of the structure of these threats, learn about web security and anti-phishing capabilities your organization needs, and much more.
Posted: 31 May 2013 | Published: 31 May 2013

Webroot
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info