IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Email Security

RSS Feed   
ALSO CALLED: e-Mail Security, E Mail Security, Secure Email
DEFINITION: Vouch By Reference (VBR) is a protocol for adding third-party certification to email. The protocol has two parts, one for the sender and one for the receiver. The first part of the protocol requires the sender to add information to their email header by creating a field called VBR-Info. The information in the field tells the receiver three things: The sender's domain.The type of content the message  … 

Email Security definition sponsored by SearchExchange.com, powered by WhatIs.com an online computer dictionary
Email Security Reports
1 - 25 of 303 Matches Previous Page  |  Next Page
Australian Organizations Know They Should Be More Cyber Resilient
sponsored by Mimecast
WHITE PAPER: If just one employee opens the wrong email attachment, the entire business can be shut down for hours. Yet, more than half of Australian companies admit they have no cyber resilience plans in place. Take a look at the rest of the shocking survey results and learn how your organization can enhance its cyber resilience, today.
Posted: 15 Aug 2018 | Published: 15 Aug 2018

Mimecast

No Kidnapping, No Ransom
sponsored by Panda Security
WHITE PAPER: Don't miss this opportunity to learn how to protect your company from the increasing cyber threat of ransomware, which has cost around $5 billion in 2017 alone. Download this white paper and discover 7 ways to avoid these ransomware attacks.
Posted: 01 Aug 2018 | Published: 01 Aug 2018

Panda Security

Email Security that Matters at the Macro-Security Level
sponsored by GreenPages Inc.
WHITE PAPER: Find out how digital transformation is expanding attack surfaces and learn how to defend against the email threats that traditional security approaches have failed to keep up with.
Posted: 12 Jul 2018 | Published: 12 Jul 2018

GreenPages Inc.

Mapping the Ransomware Landscape
sponsored by GreenPages Inc.
WHITE PAPER: Discover 5 key takeaways about the rapidly growing ransomware threat so that you can prepare your organization to defend against it proactively and effectively.
Posted: 11 Jul 2018 | Published: 31 Dec 2017

GreenPages Inc.

Email Security in the Era of the Cloud: An Executive Brief
sponsored by SparkPost
WHITE PAPER: How secure is your email from hackers? This executive brief explores the successful attacks on organizations like the Democratic National Committee, Anthem Health, Sony Pictures and Seagate and how modern cloud platforms make the complex risks more manageable.
Posted: 25 Jun 2018 | Published: 25 Jun 2018

SparkPost

Phishing Has Never Been Easier
sponsored by Cylance
RESOURCE: Open this resource to learn how to address phishing with domain-based message authentication, reporting and conformance (DMARC), an email authentication system policy and reporting protocol.
Posted: 13 Jun 2018 | Published: 13 Jun 2018

Cylance

How Fortinet Security Fabric Addresses Enterprise Security Concerns
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explores how to build a security fabric that addresses enterprise security concerns stemming from digital transformation. With advanced threats proliferating exponentially, find out how to create end-to-end protection for your network and the assets on it.
Posted: 29 May 2018 | Published: 29 May 2018

Fortinet, Inc.

Security Transformation Requires a Security Fabric
sponsored by Fortinet, Inc.
WHITE PAPER: Find out how to build your security transformation strategy for the growing attack surfaces of digital-first businesses that increasingly rely on IoT, SDN, mobile, and multi-cloud technologies.
Posted: 25 May 2018 | Published: 25 May 2018

Fortinet, Inc.

Spear Phishing: The #1 Threat
sponsored by Farsight Security
RESOURCE: Find out how you can combat spear phishing with a Newly Observed Domains (NOD) platform that integrates with your company's DNS to help you identify all new domains, assess potential threats, and prevent attacks from infiltrating your systems.
Posted: 22 May 2018 | Published: 31 Dec 2016

Farsight Security

Securing Office 365 with MobileIron
sponsored by MobileIron
WHITE PAPER: As more and more employees use Office 365 on mobile devices instead of on traditional PCs, it's become increasingly important, and difficult, to secure and deploy the app on mobile devices. Download this white paper to learn about an app security platform that solves these challenges.
Posted: 10 May 2018 | Published: 10 May 2018

MobileIron

2018 Beyond the Phish Report
sponsored by Wombat Security Technologies
ANALYST REPORT: In this Beyond the Phish report, uncover findings related to end-user risk, including identification of phishing threats, and a comparison of end-user knowledge levels across 16 industries.
Posted: 09 May 2018 | Published: 09 May 2018

Wombat Security Technologies

Protecting Against the Top 5 Attack Vectors
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Recently, there has been an abundance of cyberattacks in the news with popular companies, such as Uber and Equifax. Explore this resource to uncover how to protect against the top 5 attack vectors.
Posted: 09 Apr 2018 | Published: 09 Apr 2018

Arctic Wolf Networks, Inc.

2018 Cybersecurity Report
sponsored by Cisco & Dimension Data
RESOURCE: Defenders should prepare to face new, self-propagating, network-based threats in 2018. Explore this 68-page cybersecurity report to uncover what to expect in 2018 and how to augment your current security approach to protect against the modern day threats.
Posted: 02 Apr 2018 | Published: 02 Apr 2018

Cisco & Dimension Data

Cyber Resilience for Email
sponsored by Mimecast
RESOURCE: Email is the number one business application used by organizations, making it extremely susceptible to cybercrime. Access this resource to uncover how to improve cyber resilience for email and augment protection.
Posted: 22 Mar 2018 | Published: 22 Mar 2018

Mimecast

Stopping Email Fraud
sponsored by Proofpoint, Inc.
WHITE PAPER: Email fraud has cost victims more than $5.3 billion between the end of 2013 and 2017, according to the FBI. Leverage this resource to learn how to protect your organization from email threats including, imposters, phishers, and other non-malware threats.
Posted: 19 Mar 2018 | Published: 19 Mar 2018

Proofpoint, Inc.

Conversational Office 365 Risk Mitigation
sponsored by Mimecast
EBOOK: This e-book is designed to help you explore the tools and features of Office 365 from both a user and administrator perspective. Then, read on to learn how you can mitigate the risk to your platform.
Posted: 28 Feb 2018 | Published: 31 Dec 2017

Mimecast

The Cost of Microsoft Office 365 Security and Compliance
sponsored by Proofpoint, Inc.
RESOURCE: From phishing to malware, email makes it easy for attackers to exploit the human factor and to steal credentials, data and more. Take a look at this resource to uncover an advanced email security strategy to improve security and compliance defenses within Microsoft Office 365.
Posted: 27 Feb 2018 | Published: 27 Feb 2018

Proofpoint, Inc.

Successful Phishing Attacks at a Northeastern US College Drop by 90%
sponsored by Wombat Security Technologies
CASE STUDY: According to the Verizon DBIR, 44% of breaches in the education sector involve social attacks, including email. Explore this case study to gain insight into how one public college revamped its cybersecurity approach after falling victim to a damaging email attack.
Posted: 27 Feb 2018 | Published: 27 Feb 2018

Wombat Security Technologies

Ransomware Survival Guide
sponsored by Proofpoint, Inc.
RESEARCH CONTENT: According to a Ponemon Institute report, nearly 60% of companies believe a ransomware attack would have serious financial consequences for their business. Take a look at this guide to uncover how to survive ransomware attacks and strategies for preventing them from occurring entirely.
Posted: 26 Feb 2018 | Published: 26 Feb 2018

Proofpoint, Inc.

The Definitive Email Security Strategy Guide
sponsored by Proofpoint, Inc.
RESEARCH CONTENT: 95% of enterprise attacks are email fraud, according to the Identity Theft Resource Center. Explore this guide to uncover 5 steps to improving email security to better protect your enterprise from harmful attacks.
Posted: 26 Feb 2018 | Published: 26 Feb 2018

Proofpoint, Inc.

State of the Phish 2018
sponsored by Wombat Security Technologies
RESEARCH CONTENT: According to Wombat Security's State of the Phish 2018 Report, 76% of respondents said they experienced phishing attacks in 2017. This report helps CISOs and their teams identify opportunities to more effectively manage end-user risk within their organizations.
Posted: 26 Feb 2018 | Published: 26 Feb 2018

Wombat Security Technologies

Ransomware Defense for Healthcare in 45 Seconds
sponsored by Cisco Umbrella
VIDEO: Hacking is big business, and healthcare is the number one targeted industry. Find out how advanced malware protection can keep patient data, research and your network safe.
Posted: 10 Jul 2018 | Premiered: 10 Jul 2018

Cisco Umbrella

2018 Annual Cybersecurity Report
sponsored by Cisco Umbrella
WHITE PAPER: Defenders should prepare to face new, self-propagating, network-based threats in 2018. Explore this 68-page cybersecurity report to uncover what to expect in 2018 and how to augment your current security approach to protect against the modern day threats.
Posted: 28 Mar 2018 | Published: 28 Mar 2018

Cisco Umbrella

Security Predictions for 2018
sponsored by TrendMicro
WHITE PAPER: Ransomware and digital extortion are predicted to be cybercriminals go-to methods of attack in 2018. This resource offers security predictions for 2018 and what your organization should look out for to remain protected.
Posted: 20 Mar 2018 | Published: 20 Mar 2018

TrendMicro

2018 Cybersecurity Report
sponsored by Cisco Systems, Inc.
RESOURCE: Defenders should prepare to face new, self-propagating, network-based threats in 2018. Explore this 68-page cybersecurity report to uncover what to expect in 2018 and how to augment your current security approach to protect against the modern day threats.
Posted: 15 Mar 2018 | Published: 15 Mar 2018

Cisco Systems, Inc.
1 - 25 of 303 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement