IT Management  >   Systems Operations  >   Security  >   Security Management  >   Security Policies  >  

Email Security Policies

RSS Feed   
Email Security Policies Reports
1 - 25 of 86 Matches Previous Page  |  Next Page
Six-Step Guide to Email Security Best Practices
sponsored by Clearswift
WHITE PAPER: The growing reliance on email presents an increasingly lucrative attack vector for cybercriminals. In order to combat this rising threat, organizations need to ensure their email security hygiene is viable. To help you get started, download this white paper from Clearswift, which provides a 6-step guide to email security best practices.
Posted: 09 Jul 2020 | Published: 09 Jul 2020

Clearswift

The 5 Most Dangerous New Attack Techniques and How to Counter Them
sponsored by RSA Conference
VIDEO: What are the most dangerous new techniques attackers are employing? This fast-paced briefing features three experts from the SANS Institute best-positioned to provide answers: the nation’s top expert on mobile forensics, the director of the Internet Storm Center and the top hacker exploits expert in the US.
Posted: 07 Jul 2020 | Premiered: 28 Feb 2020

RSA Conference

2019 Proofpoint Domain Fraud Report
sponsored by Proofpoint
WHITE PAPER: Domain fraud is a growing threat vector in which the threat actor impersonates a trusted brand to launch phishing attacks and other disruptive campaigns. Download this research report to learn more about the latest domain fraud trends – including how the domains are created, common characteristics and more.
Posted: 06 Jul 2020 | Published: 06 Jul 2020

Proofpoint

Remote Work Cybersecurity: Best Practices & Trends
sponsored by Kaspersky Lab
EGUIDE: The COVID-19 pandemic has sparked an increase in malware attacks. To make matters worse, many people now find themselves working from home without any special IT awareness training to help them identify cyberattacks. In this e-guide, learn more about how to gain control of your cybersecurity during these times of uncertainty.
Posted: 06 Jul 2020 | Published: 30 Jun 2020

Kaspersky Lab

5 Identity Attacks that Exploit Your Broken Authentication
sponsored by Okta
RESOURCE: Compromised credentials are the leading cause of data beaches. These credentials can be compromised through a number of attacks, including phishing, credential stuffing and password spraying. In this infographic, learn how your organization can defend against data breaches with strong authentication.
Posted: 30 Jun 2020 | Published: 30 Jun 2020

Okta

The Definitive Guide to Secure Collaborative Tools
sponsored by Armorblox
WHITE PAPER: Secure collaboration has become necessary in a world in which both remote work and security threats are increasing. In 2019, the FBI reported that $26 billion had been lost to business email compromise in the last three years. Explore this white paper for valuable information to how keep your office environment protected.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Armorblox

Stop Targeted Attacks and Data Loss on G Suite
sponsored by Armorblox
PRODUCT OVERVIEW: Today’s cloud-delivered email inboxes require deliberate security measures that go above and beyond traditional on-prem email security practices and tools. Download this solution brief to learn more about Armorblox for G Suite, designed to prevent targeted cyberattacks and data loss on cloud-delivered email platforms.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Armorblox

Stop Phishing and Data Loss on Slack
sponsored by Armorblox
DATA SHEET: In this brief, learn how Armorblox for Slack can help to stop malicious URLs and attachments, prevent PII/PCI disclosures, and protect against lateral data loss across cloud applications.
Posted: 26 Jun 2020 | Published: 26 Jun 2020

Armorblox

Stop Targeted Attacks and Data Loss on Office 365
sponsored by Armorblox
DATA SHEET: In this brief, learn how Armorblox for Office 365 can help stop targeted email attacks, protect against direct and lateral data loss, and automate remediation of threats reported to the phishing/abuse mailbox.
Posted: 26 Jun 2020 | Published: 26 Jun 2020

Armorblox

Protecting Your Business from Cyberthreats in 2020
sponsored by Barracuda
EBOOK: Modern hackers have taken traditional methods of cyberattack and altered them to become more precise, more aggressive, and more dangerous. The FBI reported that business email compromise attacks cost organizations $26 billion in the past three years, and this number may be due to increase. Learn more about evolving threats in this e-book.
Posted: 26 Jun 2020 | Published: 26 Jun 2020

Barracuda

Stop targeted attacks and data loss on Exchange
sponsored by Armorblox
PRODUCT OVERVIEW: While email is rapidly moving towards the cloud, most organizations opt for on-premise or hybrid deployments. Unfortunately, cloud-based email security solutions are often ill-equipped to protect hybrid inboxes. Download this solution brief to learn more about a cloud email security platform designed to stop targeted attacks and data loss.
Posted: 25 Jun 2020 | Published: 25 Jun 2020

Armorblox

2020 User Risk Report
sponsored by Proofpoint
WHITE PAPER: Access this white paper to discover user cybersecurity awareness and knowledge gaps while discovering specific actions you can take to empower your people and build up your cyber resilience.
Posted: 25 Jun 2020 | Published: 24 Jun 2020

Proofpoint

13 Email Threat Types to Know about Right Now
sponsored by Barracuda
RESOURCE: As email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.
Posted: 07 May 2020 | Published: 01 May 2020

Barracuda

Evolution of Email Security
sponsored by Barracuda
WEBCAST: Ever since it became a critical tool for business communications, email has been the target of increasingly sophisticated cyberattacks. In this webinar, join Barracuda security experts as they overview the evolution of email security from early inbox threats to campaigns taking advantage of the current pandemic.
Posted: 04 May 2020 | Premiered: May 4, 2020

Barracuda

Barracuda Forensics and Incident Response
sponsored by Barracuda
VIDEO: When it comes to email-based threats, incident response is traditionally a manual process that costs time and money. In this short video, take a closer look at the key features of Barracuda Forensics and Incident Response, which is designed to replace outdated methods with an automated, data-driven approach.
Posted: 24 Apr 2020 | Premiered: 24 Apr 2020

Barracuda

Protecting Business and Remote Workers from COVID-19 Email Threats
sponsored by Barracuda
VIDEO: The recent shift to working remotely as a result of the spread of COVID-19 has made organizations more vulnerable to email-based cyberattacks. This webinar breaks down the various methods being used by hackers and offers best practices for protecting your business and workers.
Posted: 21 Apr 2020 | Premiered: 21 Apr 2020

Barracuda

2020 State of Malware Report
sponsored by Malwarebytes
WHITE PAPER: Each year, cybercriminals come up with more creative ways to infect organizations, devices and users in order to cause disruptions. In this 2020 State of Malware Report, take a closer look at some of the key attack trends in 2019 and see how the threat landscape has evolved over the last decade.
Posted: 14 Apr 2020 | Published: 29 Feb 2020

Malwarebytes

WEBINAR: Protecting Against Coronavirus Email Fraud
sponsored by Armorblox
VIDEO: Socially engineered attacks are always aligned with what people are talking (or worried) about. So, it should come as no surprise that record amounts of cyberattacks have been using the current Coronavirus pandemic as a lure to cause disruptions. Watch this webinar to learn more about their tactics and how to spot them.
Posted: 14 Apr 2020 | Premiered: 08 Apr 2020

Armorblox

How Vendor Email Compromise Works
sponsored by Armorblox
WHITE PAPER: The FBI updated their estimate of how much money was lost due to Business Email Compromise (BEC) attacks to $26 billion over the past three years, making it one of the costliest forms of cyberattack. Recently, Vendor Email Compromise (VEC), a variant of BEC, has emerged. In this blog post, learn more about VEC and how it differs from BEC.
Posted: 14 Apr 2020 | Published: 14 Apr 2020

Armorblox

Third-Party Security Controls Needed to Close Gaps in Native Email Security
sponsored by Armorblox
ANALYST REPORT: With the move to cloud-delivered email solutions and an expanding email threat landscape, email security is in a state of transformation and organizations are reconsidering their current email security controls. Tap into this ESG report to learn what 403 IT and security professionals have to say about their email security concerns.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Armorblox

Trends in Email Security
sponsored by Armorblox
RESEARCH CONTENT: Phishing attacks are on the rise this year and this ESG report has the numbers to prove it. Download the report to uncover email security trends for 2020 and learn how your organization can stay protected from targeted attacks such as business email compromise, account takeover, and impersonation.
Posted: 03 Apr 2020 | Published: 03 Apr 2020

Armorblox

Inbound and Outbound Email Protection
sponsored by Armorblox
DATA SHEET: Email attacks today are laser targeted and evade traditional detection by preying on human nature. That’s why organizations today need an email security platform that protects against targeted attacks such as BEC, account takeover, and executive impersonations. View this data sheet to learn about Armorblox’s platform features and benefits.
Posted: 02 Mar 2020 | Published: 02 Mar 2020

Armorblox

Email security: Never more important
sponsored by ComputerWeekly.com
EBOOK: In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

ComputerWeekly.com

CCPA compliance guide for email
sponsored by Egress Software Technologies Inc
WHITE PAPER: 2020 marks the initiation of the United States’ first data privacy law – the CCPA. How has your organization prepared? Download this white paper to uncover the 3-phase approach to compliance and recommended tactics related to email security & file sharing.
Posted: 30 Jan 2020 | Published: 30 Jan 2020

Egress Software Technologies Inc

Egress Email and File Protection is cream of the crop for Farm Credit Mid-America
sponsored by Egress Software Technologies Inc
CASE STUDY: Taking inspiration from the internal system security best practices used by financial organizations, this case study follows the journey of Farm Credit Mid-America as they partner with Egress to proactively establish an email and file security for ensuring the protection of sensitive data.
Posted: 30 Jan 2020 | Published: 30 Jan 2020

Egress Software Technologies Inc
1 - 25 of 86 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info