IT Management  >   Systems Operations  >   Security  >   Data Security  >   Data Encryption  >  

Email Decryption

RSS Feed   
Email Decryption Reports
 
Eliminate the Threat of Exfiltrative, Extortive Ransomware
sponsored by Atakama
RESOURCE: Maze ransomware involves developers and ‘affiliates’ leveraging ransomware-as-a-services technology to actually scale ransomware attacks. It first appeared in May 2019, and with ransomware damage costs projected to reach $20 billion by 2021, the time to invest in ransomware defense is now. Browse this article to see how Atakama can help.
Posted: 07 Dec 2020 | Published: 08 Jul 2020

Atakama

Spear Phishing: Top Threats and Trends
sponsored by Barracuda
WHITE PAPER: This report takes an in-depth look at lateral phishing tactics. Read on to gain exclusive insight into recipient targeting strategies, the 10 most common words used in lateral phishing emails, 3 ways to defend against lateral phishing, and more.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

Barracuda

Six Email Security Best Practices for Email SaaS
sponsored by SearchSecurity.com
EGUIDE: This expert guide will teach you six e-mail security best practices for e-mail Security as a Service (SaaS). Read on to learn more about guarding access to data, evaluating physical controls, entering service contracts, and more.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

SearchSecurity.com

Expert ways to maximize security in Exchange
sponsored by SearchDataCenter.com
EGUIDE: This expert e-guide provides tips for maximizing Exchange security, including how to leverage the enhanced capabilities in Forefront Protection 2010. In addition, it reviews the 6 most commonly overlooked Exchange security vulnerabilities.
Posted: 02 May 2012 | Published: 02 May 2012

SearchDataCenter.com

Phishing: Not Just One Kind of Attack
sponsored by Atakama
RESOURCE: Phishing attacks utilize a wide range of ever-evolving techniques to steal data, from impersonating executives to targeting and duping unsuspecting employees. How can you better understand these scams? This article breaks down common schemes, their targets and their indicators, and gives a solution from Atakama for keeping these threats at bay.
Posted: 07 Dec 2020 | Published: 19 Aug 2020

Atakama

ESG: Realizing and Maximizing E-mail Archiving ROI
sponsored by EMC Corporation
WHITE PAPER: ESG research indicates that organizations with e-mail archive implementations experience several measurable benefits, including lower storage costs as well as more efficient compliance, electronic discovery, and data protection operations. This white paper discusses the benefits of evaluating solutions to achieve the statuses mentioned above.
Posted: 23 Apr 2009 | Published: 23 Apr 2009

EMC Corporation

Who’s Snooping on Your Email?
sponsored by Sophos
WHITE PAPER: This exclusive paper examines the security challenges that email today brings to the enterprise, and discusses why your organization needs a secure email gateway that offers more than just encryption.
Posted: 17 Dec 2013 | Published: 17 Dec 2013

Sophos

How to Build an Enterprise Cybersecurity Plan
sponsored by Fortinet, Inc.
EGUIDE: A cybersecurity action plan is a crucial part of achieving a state of cybersecurity readiness. Inside this guide, industry expert Peter Sullivan explains what goes into these plans and how to get one started.
Posted: 26 May 2017 | Published: 26 May 2017

Fortinet, Inc.

Policy Based Encryption: Protecting your Business Against Email Risks
sponsored by Apptix
WHITE PAPER: This white paper features a cloud-based gateway service offering policy-based encryption to protect your business email exchanges.
Posted: 18 Apr 2014 | Published: 31 Dec 2013

Apptix

Entrust Entelligence™ Messaging Server
sponsored by Entrust, Inc.
WHITE PAPER: The Entrust Entelligence Messaging Server is an appliance-based gateway that delivers standards-based e-mail encryption capabilities.
Posted: 19 Feb 2008 | Published: 01 Jan 2007

Entrust, Inc.
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info