IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  

Brand Spoofing

RSS Feed   
Brand Spoofing Reports
 
Cisco Cloud Mailbox Defense
sponsored by Cisco Umbrella
DATA SHEET: Your Office 365 migration is paying off, but you have new questions and challenges about how best to secure your new cloud environment. Are you adequately protected from threats without controlling your internal mail? Leverage this data sheet to learn how Cisco’s Cloud Mailbox Defense strives to keep your cloud mailboxes safe.
Posted: 26 Feb 2021 | Published: 29 May 2020

Cisco Umbrella

The State of Email Security 2020
sponsored by Mimecast
EGUIDE: The state of email security in 2020 is unlike any other year – as a prominent communication tool in the ‘new normal’, it has seen a surge in both user volume as well as malicious activity. This e-guide provides an in-depth look at key statistics and known threats to provide you with a better understanding of the current state of email security.
Posted: 07 Aug 2020 | Published: 07 Aug 2020

Mimecast

Around the World in 34 Phish: COVID-19 Phishing Examples
sponsored by Inky Technology
RESOURCE: The state of the world has left email servers more vulnerable to attack than ever. As phishing is the most used method of cyberattack in the world, there have been plenty of examples to identify and dissect to help people develop a more watchful eye. Browse this article to see 34 different examples of phishing scams across the globe.
Posted: 28 Sep 2020 | Published: 28 Sep 2020

Inky Technology

Mitigations for Mobile Phishing Problems on the iOS Platform
sponsored by SearchSecurity.com
EGUIDE: Attackers today are commonly using SMS messaging as a form of mobile device phishing. This expert E-Guide will walk you through the basics of SMS-based attacks and what security teams can do to mitigate the risk associated with iOS devices. Read on to learn more.
Posted: 03 May 2013 | Published: 03 May 2013

SearchSecurity.com

Passwordless Datasheet
sponsored by Okta
DATA SHEET: Identity-driven attacks are increasingly common methods for committing account takeovers. These attacks result in increased security risks, brand damage and outright fraud. Read this data sheet to discover how passwordless authentication can help keep attackers at bay without locking out good users.
Posted: 05 Dec 2019 | Published: 05 Dec 2019

Okta

All together now
sponsored by ServiceNow
WHITE PAPER: 2020 has been a disastrous and disruptive year for organizations and their security programs. Upticks in cyberattacks – like malware – have led to significant and costly breaches. Read this white paper to learn more about the effects of 2020 and how IT and security teams can collaborate to drive operational resilience against today’s threats.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

ServiceNow

Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
sponsored by Core Security Technologies
WHITE PAPER: This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Core Security Technologies

5 Ways to Prevent a Ransomware Infection through Network Security
sponsored by IBM
EGUIDE: Even though ransomware attacks are becoming more creative, getting back to the basics of network security could be the key to preventing future infections. In this e-guide, we explore 5 key steps for preventing ransomware attacks.
Posted: 05 Oct 2016 | Published: 03 Oct 2016

IBM

Create an Effective Email Phishing Test in 7 Steps
sponsored by Cisco Umbrella
EGUIDE: The best way for IT to improve email phishing security is through comprehensive testing, which helps identity which users are susceptible and what type of fake email is more effective. Dive into this e-guide to learn how to create an effective email phishing test in 7 steps.
Posted: 22 Nov 2019 | Published: 21 May 2018

Cisco Umbrella

The Bot Threat
sponsored by Hewlett Packard Enterprise
WHITE PAPER: In this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defense-in-depth security system to prevent these attacks from compromising your networks.
Posted: 01 Feb 2015 | Published: 13 Nov 2013

Hewlett Packard Enterprise
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences