Software  >  

Blended Threats

RSS Feed   
Blended Threats Reports
 
Getting Started with DMARC
sponsored by Proofpoint
WHITE PAPER: Email is great for business, but unfortunately, the very things that make email so popular also make it a vector of choice for cybercriminals. However, the DMARC standard is one of the most powerful weapons to date in the fight against phishing. In this white paper, explore what DMARC is, how it works and its key benefits.
Posted: 28 Jun 2019 | Published: 28 Feb 2019

Proofpoint

2019 Mobile Threat Landscape Report
sponsored by CrowdStrike
ANALYST REPORT: Malicious actors have increasingly sought to diversify the way they attempt to compromise their targets and achieve their objectives. In this research report, discover key types of mobile malware observed so far in 2019, along with their typical deployment mechanism. Also, explore how and why certain criminal actors are targeting mobile devices.
Posted: 14 Aug 2019 | Published: 14 Aug 2019

CrowdStrike

CenturyLink 2019 Threat Report
sponsored by CenturyLink
ANALYST REPORT: Organizations will continue to accelerate the deployment of new technologies and capabilities that drive network traffic and security complexity. In the CenturyLink 2019 Threat Report, explore the role of deep network-based threat intelligence and discover the latest risks and attacks including botnets, DNS attacks, and more.
Posted: 19 Sep 2019 | Published: 19 Sep 2019

CenturyLink

The State of Email Security Report 2019 Key Findings
sponsored by Mimecast
RESOURCE: 94% of organizations experienced a phishing attack in Mimecast's State of Email Security survey. In this infographic, explore more key finding from the study to gain a better understanding of organization's biggest email challenges.
Posted: 27 Jun 2019 | Published: 27 Jun 2019

Mimecast

Optimizing the Security Stack
sponsored by Morphisec, Inc.
DATA SHEET: In this white paper, examine the optimal way to protect endpoints from both known and unknown attacks and review the Windows Defender Antivirus offering.
Posted: 13 Sep 2019 | Published: 13 Sep 2019

Morphisec, Inc.

2019 Financial Consumer Cybersecurity Threat Index
sponsored by Morphisec, Inc.
ANALYST REPORT: As Morphisec continues to assist financial providers with improving defenses and protecting consumer financial data and funds, they decided to examine how the increasing amount of financial cyberattacks are impacting the mindset of consumers. Download Morphisec's 2019 U.S. Consumer Financial Cybersecurity Threat Index to see what they found.
Posted: 10 Sep 2019 | Published: 10 Sep 2019

Morphisec, Inc.

Webcast: 5 Steps to Selecting an Enterprise Antivirus Replacement
sponsored by Ziften
WEBCAST: 38% of enterprises plan to replace their AV in the next 12 months, according to The State of Endpoint Security Risk, Ponemon Institute study. However, researching and finding an endpoint security solution can be overwhelming. In this webcast, explore 5 steps to help you select an enterprise antivirus replacement.
Posted: 17 Jun 2019 | Premiered: Jun 17, 2019

Ziften

Agile Software Testing Pioneer Slams the Door on C-level Email Attacks
sponsored by Barracuda
CASE STUDY: Learn how Tricentis, an automated software testing company, was able to thwart spear-phishing and fraud attacks against senior staff.
Posted: 07 Jun 2019 | Published: 07 Jun 2019

Barracuda

Office 365 Anti-Phishing Tools
sponsored by Cisco Umbrella
EGUIDE: Microsoft released a new set of anti-phishing tools available as part of Office 365 Advanced Threat Protection. However, for these features to be effective, administrators need to understand how to use the tools and how to properly implement them. Download this e-guide to learn more.
Posted: 06 Sep 2019 | Published: 04 Sep 2019

Cisco Umbrella

2019 Special Phishing Report
sponsored by Inky Technology
ANALYST REPORT: Just a single phishing attack can cost an organization hundreds of thousands, if not millions, of dollars. In this 2019 Special Phishing Report, discover how many phishing emails still breach the leading email protection systems, and why identifying and blocking these attacks still poses such a challenge.
Posted: 16 Jul 2019 | Published: 16 Jul 2019

Inky Technology
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement