IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

E Mail Security

RSS Feed   
E Mail Security Reports
 
Security Awareness Computer-Based Training
sponsored by Proofpoint
RESEARCH CONTENT: The market for security awareness computer-based training (CBT) is driven by the recognition that people play a critical role in an organization's overall security and risk. Organizations must invest in tools that increase awareness. In Gartner's Magic Quadrant report, explore security awareness CBT market trends and key vendors in the field.
Posted: 07 May 2019 | Published: 13 Nov 2018

Proofpoint

The state of email trust in 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Email security improved in 2014 but most companies still haven't done enough to protect their customers from phishing attacks, this study from Agari reveals.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

ComputerWeekly.com

Computer Weekly – 31 October 2017: IT rules the waves in the Volvo Ocean Race
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we go behind the scenes at the Volvo Ocean Race to see the technology supporting the yachts around the world. A security vulnerability puts every Wi-Fi network at risk of attack – we examine the problem. And we find out how the Mercedes F1 team used data analytics to win this year's championship. Read the issue now.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

ComputerWeekly.com

Phish Phinder: Tell-Tale Signs of a (Potentially) Successful Email Phishing Scam
sponsored by Avast Software
RESOURCE: Email phishing scams are often successful and can put your organization at major risk with stolen credentials and credit card information. In this infographic, discover tips and tricks for detecting a potentially successful email phishing scam today.
Posted: 02 Apr 2019 | Published: 02 Apr 2019

Avast Software

Redefining Security Orchestration, Automation & Response with the MITRE ATT&CK Framework
sponsored by D3 Security
WHITE PAPER: SOAR platforms are broadly effective at the linear process of in-taking events and orchestrating response actions. However, they vary in their ability to support larger investigations that identify the scope of an incident. In this white paper, learn more about SOAR platforms including key differences between event-based and intent-based response.
Posted: 02 Apr 2019 | Published: 02 Apr 2019

D3 Security

"Hacking as a Service," and Other Emerging Threats
sponsored by SearchSecurity.com
EZINE: Lethal threats to enterprise security are emerging from every which way. Access this exclusive edition of Information Security Magazine to learn just what you're up against.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

SearchSecurity.com

Overcoming Security Breaches and Minimizing the Impact
sponsored by Dell SecureWorks
WHITE PAPER: Uncover the top 10 things you should do to enhance the security of your enterprise and reduce the duration and impact of a security breach.
Posted: 23 May 2013 | Published: 23 May 2013

Dell SecureWorks

Advanced Malware Protection for your Web and Email Gateways
sponsored by Cisco Systems, Inc.
PRESS RELEASE: This article explores the recent merger between one company's advanced malware protection and their web and email gateways.
Posted: 22 Apr 2014 | Published: 25 Feb 2014

Cisco Systems, Inc.

Symantec Data Loss Prevention for Mobile
sponsored by Symantec Corporation
WEBCAST: This webcast introduces the highest-rated DLP solution with industry-leading detection technology.
Posted: 27 Jun 2014 | Premiered: Jun 27, 2014

Symantec Corporation

Office 365: Cloud Data Security Considerations to Explore Before Adopting
sponsored by Proofpoint
EGUIDE: IT and security pros are excited about the benefits that Office 365 in the cloud can deliver, but it's important to understand how data security will be impacted. Explore 4 things to consider to ensure you're doing what's right to protect data in the cloud. In addition, security expert Dave Shackleford reviews security pros and cons of Office 365.
Posted: 14 Jun 2016 | Published: 07 Jun 2016

Proofpoint
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement