IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Email Security

RSS Feed   
ALSO CALLED: e-Mail Security, E Mail Security, Secure Email
DEFINITION: Vouch By Reference (VBR) is a protocol for adding third-party certification to email. The protocol has two parts, one for the sender and one for the receiver. The first part of the protocol requires the sender to add information to their email header by creating a field called VBR-Info. The information in the field tells the receiver three things: The sender's domain.The type of content the message  … 

Email Security definition sponsored by, powered by an online computer dictionary
Email Security Reports
1 - 25 of 300 Matches Previous Page  |  Next Page
2018 Cybersecurity Report
sponsored by Cisco Systems, Inc.
RESOURCE: Defenders should prepare to face new, self-propagating, network-based threats in 2018. Explore this 68-page cybersecurity report to uncover what to expect in 2018 and how to augment your current security approach to protect against the modern day threats.
Posted: 15 Mar 2018 | Published: 15 Mar 2018

Cisco Systems, Inc.

Conversational Office 365 Risk Mitigation
sponsored by Mimecast
EBOOK: This e-book is designed to help you explore the tools and features of Office 365 from both a user and administrator perspective. Then, read on to learn how you can mitigate the risk to your platform.
Posted: 28 Feb 2018 | Published: 31 Dec 2017


The Cost of Microsoft Office 365 Security and Compliance
sponsored by Proofpoint, Inc.
RESOURCE: From phishing to malware, email makes it easy for attackers to exploit the human factor and to steal credentials, data and more. Take a look at this resource to uncover an advanced email security strategy to improve security and compliance defenses within Microsoft Office 365.
Posted: 27 Feb 2018 | Published: 27 Feb 2018

Proofpoint, Inc.

Successful Phishing Attacks at a Northeastern US College Drop by 90%
sponsored by Wombat Security Technologies
CASE STUDY: According to the Verizon DBIR, 44% of breaches in the education sector involve social attacks, including email. Explore this case study to gain insight into how one public college revamped its cybersecurity approach after falling victim to a damaging email attack.
Posted: 27 Feb 2018 | Published: 27 Feb 2018

Wombat Security Technologies

Advanced Threat Protection Integration
sponsored by Phantom Cyber
VIDEO: How is your enterprise protecting against looming threats? Explore this webcast with Phantom and Symantec to gain insight into integrating an advanced threat protection strategy to detect, investigate and respond to threats.
Posted: 26 Feb 2018 | Premiered: 21 Feb 2018

Phantom Cyber

Ransomware Survival Guide
sponsored by Proofpoint, Inc.
RESEARCH CONTENT: According to a Ponemon Institute report, nearly 60% of companies believe a ransomware attack would have serious financial consequences for their business. Take a look at this guide to uncover how to survive ransomware attacks and strategies for preventing them from occurring entirely.
Posted: 26 Feb 2018 | Published: 26 Feb 2018

Proofpoint, Inc.

The Definitive Email Security Strategy Guide
sponsored by Proofpoint, Inc.
RESEARCH CONTENT: 95% of enterprise attacks are email fraud, according to the Identity Theft Resource Center. Explore this guide to uncover 5 steps to improving email security to better protect your enterprise from harmful attacks.
Posted: 26 Feb 2018 | Published: 26 Feb 2018

Proofpoint, Inc.

State of the Phish 2018
sponsored by Wombat Security Technologies
RESEARCH CONTENT: According to Wombat Security's State of the Phish 2018 Report, 76% of respondents said they experienced phishing attacks in 2017. This report helps CISOs and their teams identify opportunities to more effectively manage end-user risk within their organizations.
Posted: 26 Feb 2018 | Published: 26 Feb 2018

Wombat Security Technologies

The Voice of the Enterprise CISO
sponsored by NSS Labs
WHITE PAPER: According to the 2017 Verizon DBIR, approximately 90% of all security incidents and breaches involve some form of phishing attack. This white paper uncovers the biggest challenges for security leaders and offers strategies for combatting such challenges.
Posted: 09 Feb 2018 | Published: 09 Feb 2018

NSS Labs

Total Protection for Your Microsoft Office 365 Email Data with Veeam
sponsored by Veeam Software
WEBCAST: Watch this webinar to discover how Veeam Backup for Microsoft Office 365 allows you to protect against data loss scenarios not covered by Microsoft and simplify email data protection and recovery.
Posted: 06 Feb 2018 | Premiered: Dec 21, 2016

Veeam Software

Secure Coding Practices: Avoid Mail Command Injection Attacks
sponsored by WhiteHat Security
VIDEO: Just what is web mail command injection, how does it happen, and what can you do to protect yourself? Get the answers to these questions and more in this webcast, where Zach Jones, Senior Director of TRC Static Analysis explores what makes these threats so unique, as well some best practices for mitigating the damage they can cause.
Posted: 19 Jan 2018 | Premiered: 16 Jan 2018

WhiteHat Security

Potential ROI and Benefits of ServiceNow Security Operations
sponsored by ServiceNow
RESEARCH CONTENT: This report provides a framework for evaluating the potential financial impact of investing in ServiceNow Security Operations to improve security incident and vulnerability response processes.
Posted: 18 Jan 2018 | Published: 31 Jan 2018


Key Data Protection Requirements of GDPR
sponsored by Fortinet, Inc.
WHITE PAPER: To prevent attacks and adhere to the GDPR, advanced threat protection and detection is critical. This GDPR checklist offers everything your company needs to comply with the regulation as well as strategies for improving your security posture.
Posted: 15 Jan 2018 | Published: 15 Jan 2018

Fortinet, Inc.

Filling the Gaps in Office 365
sponsored by Proofpoint, Inc.
WHITE PAPER: This white paper provides information from an Osterman Research survey regarding users' experience with Office 365 security.
Posted: 10 Jan 2018 | Published: 10 Jan 2018

Proofpoint, Inc.

Castles in the Cloud: Security and Compliance for Office 365
sponsored by Proofpoint, Inc.
EBOOK: Email makes it easy for attackers to exploit the "human factor" of security and steal credentials, data and more. In fact, 91% of targeted attacks target people, according to Proofpoint. This e-book offers strategies for enhancing your Office 365 security posture by improving compliance and threat detection techniques.
Posted: 10 Jan 2018 | Published: 10 Jan 2018

Proofpoint, Inc.

The 7 Challenges to Online Identity Verification
sponsored by Evident
WHITE PAPER: Lack of trust is the most important hurdle for users of the sharing economy, so providers must deliver security to their users. This white paper provides actionable steps to secure your business to demonstrate your marketplace is a safe place for people to engage.
Posted: 30 Nov 2017 | Published: 30 Nov 2017


Augmenting security and management of Office 365 with Citrix XenMobile
sponsored by Citrix
WHITE PAPER: Download this white paper to discover how to securely deploy and manage Office 365, protect data at rest on mobile devices and protect data in transit. You'll also learn how to configure mobile apps with hosted Exchange and more.
Posted: 15 Nov 2017 | Published: 15 Nov 2017


Top-of-Mind Threats and Their Impact on Endpoint Security Decisions
sponsored by Cylance
WHITE PAPER: According to this ESG report, 91% of cybersecurity professionals express the greatest concern over the threat posed by email phishing. Explore this report to learn how to protect your organization's endpoints against cyberattacks with specific defense strategies, including machine learning.
Posted: 01 Nov 2017 | Published: 01 Nov 2017


Computer Weekly – 31 October 2017: IT rules the waves in the Volvo Ocean Race
sponsored by
EZINE: In this week's Computer Weekly, we go behind the scenes at the Volvo Ocean Race to see the technology supporting the yachts around the world. A security vulnerability puts every Wi-Fi network at risk of attack – we examine the problem. And we find out how the Mercedes F1 team used data analytics to win this year's championship. Read the issue now.
Posted: 27 Oct 2017 | Published: 27 Oct 2017

Computer Weekly – 24 October 2017: Where will AI take us?
sponsored by
EZINE: In this week's Computer Weekly, artificial intelligence (AI) enthusiasts and sceptics debate the opportunities and risks of the much-hyped technology. Our latest buyer's guide examines the benefits of cloud-native applications. And we look at best practice in defending email systems from cyber attacks. Read the issue now.
Posted: 20 Oct 2017 | Published: 24 Oct 2017

Next Generation Secure Web Gateway: The Cornerstone of Your Security Architecture
sponsored by Symantec
WHITE PAPER: Explore this white paper to uncover whether a web proxy would be beneficial in protecting your organization from sophisticated web-based attacks.
Posted: 06 Oct 2017 | Published: 06 Oct 2017


The Human Factor 2017
sponsored by Proofpoint, Inc.
VIDEO: 90% of clicks on malicious URLs occur within 24 hours after they're delivered. Key into this webcast to get a closer look at when users are most likely to click into malicious URLs, which industry's users click the most, and what types of attacks have the most clicks.
Posted: 06 Oct 2017 | Premiered: 06 Oct 2017

Proofpoint, Inc.

Your Security Sandbox Won't Catch it all: The Phishing Problem
sponsored by Proofpoint, Inc.
WEBCAST: Take a look at this webcast to uncover different types of email threats through various applications and what your organization can do to reduce your vulnerabilities against malware.
Posted: 04 Oct 2017 | Premiered: Oct 4, 2017

Proofpoint, Inc.

A Primer on File-Borne Malware Threats
sponsored by OPSWAT inc
WHITE PAPER: Verizon's 2017 Data Breach Investigations Report found that 66% of malware was installed via malicious email attachments. In this white paper, examine the ways attackers use files to deliver malware, the reasons these methods are effective, and the steps organizations should take to block these kinds of attacks.
Posted: 02 Oct 2017 | Published: 02 Oct 2017

Spain: Internet Security Threat Profile in Numbers
sponsored by Symantec & Blue Coat Systems
WHITE PAPER: Which industries in Spain receive the most malware, phishing and spam attacks?
Posted: 14 Sep 2017 | Published: 31 Mar 2017

Symantec & Blue Coat Systems
1 - 25 of 300 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement