IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Email Security

RSS Feed   
ALSO CALLED: e-Mail Security, E Mail Security, Secure Email
DEFINITION: Vouch By Reference (VBR) is a protocol for adding third-party certification to email. The protocol has two parts, one for the sender and one for the receiver. The first part of the protocol requires the sender to add information to their email header by creating a field called VBR-Info. The information in the field tells the receiver three things: The sender's domain.The type of content the message  … 

Email Security definition sponsored by SearchExchange.com, powered by WhatIs.com an online computer dictionary
Email Security Reports
1 - 25 of 318 Matches Previous Page  |  Next Page
2018 User Risk Report
sponsored by Wombat Security Technologies
RESEARCH CONTENT: More than 6,000 working adults across the world were surveyed about their personal security habits. To find out what these employees really know about cybersecurity, download this report for some shocking results.
Posted: 16 Oct 2018 | Published: 16 Oct 2018

Wombat Security Technologies

Playbook Fridays: Forcing Active Directory (AD) Password Resets via ThreatConnect Victims
sponsored by ThreatConnect
RESOURCE: This blog post highlights an intelligence driven orchestration platform that automates almost any cybersecurity task, runs in real time, and provides you with detail information about each run. Find out how this platform can integrate with your active directory service to detect attacks and prevent damaging breaches.
Posted: 11 Oct 2018 | Published: 08 May 2018

ThreatConnect

Keeping Users Off the Spear Phishing Hook Webinar
sponsored by MediaPRO
VIDEO: Increasingly, IT security teams are running simulated phishing campaigns internally, to try and reduce their exposure to phishing threats. To learn how your organization can deploy this kind of training, tune into this webinar for simulation best practices, anti-phishing tools, and more.
Posted: 01 Oct 2018 | Premiered: 19 Sep 2018

MediaPRO

A How-To Guide for Effective Simulated Phishing Campaigns
sponsored by MediaPRO
WHITE PAPER: As many companies know, innocent-looking email requests can lead to the release of sensitive information. This is why employers are adopting simulated email phishing campaigns to test the true knowledge of their employees. Read on for best practices to get the most out of your phishing campaigns.
Posted: 28 Sep 2018 | Published: 28 Sep 2018

MediaPRO

How Huisman Used Forcepoint Email and Web Security Cloud to Reduce Risk
sponsored by Forcepoint
CASE STUDY: Find out how Huisman, a globally operating company specializing in engineering and manufacturing, reduced risk with Forcepoint's cloud solution for email and web security.
Posted: 10 Sep 2018 | Published: 10 Sep 2018

Forcepoint

Cyber Resilience for Email: Technical Deep Dive
sponsored by Mimecast
WHITE PAPER: Email is the number one application that organizations depend on for communications. Unfortunately, it is also the number-one attack vector used by cybercriminals. Learn how your organization can stay protected against advanced email-borne threats, today.
Posted: 05 Sep 2018 | Published: 05 Sep 2018

Mimecast

Cyber Resilience for Email: Solution Brief
sponsored by Mimecast
EBRIEF: Learn how your organization can stay protected against advanced email-borne threats through Mimecast's threat protection, adaptability recoverability and durability solution.
Posted: 04 Sep 2018 | Published: 04 Sep 2018

Mimecast

Mimecast Advanced Security
sponsored by Mimecast
DATA SHEET: Learn how Mimecast's set of advanced cloud-based email security services can help protect your organization from advanced email-borne threats.
Posted: 04 Sep 2018 | Published: 04 Sep 2018

Mimecast

The State of Email Security: 2018 Report
sponsored by Mimecast
WHITE PAPER: Email is at the intersection of a massive amount of risk. Attackers are using IT initiatives like migrating emails to cloud platforms are giving them the opportunity to exploit gaps in your security program. Download this report to learn more about how to fill the gaps in your email security.
Posted: 31 Aug 2018 | Published: 31 Aug 2018

Mimecast

Australian Organizations Know They Should Be More Cyber Resilient
sponsored by Mimecast
WHITE PAPER: If just one employee opens the wrong email attachment, the entire business can be shut down for hours. Yet, more than half of Australian companies admit they have no cyber resilience plans in place. Take a look at the rest of the shocking survey results and learn how your organization can enhance its cyber resilience, today.
Posted: 15 Aug 2018 | Published: 15 Aug 2018

Mimecast

No Kidnapping, No Ransom
sponsored by Panda Security
WHITE PAPER: Don't miss this opportunity to learn how to protect your company from the increasing cyber threat of ransomware, which has cost around $5 billion in 2017 alone. Download this white paper and discover 7 ways to avoid these ransomware attacks.
Posted: 01 Aug 2018 | Published: 01 Aug 2018

Panda Security

Phishing Has Never Been Easier
sponsored by Cylance
RESOURCE: Open this resource to learn how to address phishing with domain-based message authentication, reporting and conformance (DMARC), an email authentication system policy and reporting protocol.
Posted: 13 Jun 2018 | Published: 13 Jun 2018

Cylance

How Fortinet Security Fabric Addresses Enterprise Security Concerns
sponsored by Fortinet, Inc.
WHITE PAPER: This white paper explores how to build a security fabric that addresses enterprise security concerns stemming from digital transformation. With advanced threats proliferating exponentially, find out how to create end-to-end protection for your network and the assets on it.
Posted: 29 May 2018 | Published: 29 May 2018

Fortinet, Inc.

Security Transformation Requires a Security Fabric
sponsored by Fortinet, Inc.
WHITE PAPER: Find out how to build your security transformation strategy for the growing attack surfaces of digital-first businesses that increasingly rely on IoT, SDN, mobile, and multi-cloud technologies.
Posted: 25 May 2018 | Published: 25 May 2018

Fortinet, Inc.

Spear Phishing: The #1 Threat
sponsored by Farsight Security
RESOURCE: Find out how you can combat spear phishing with a Newly Observed Domains (NOD) platform that integrates with your company's DNS to help you identify all new domains, assess potential threats, and prevent attacks from infiltrating your systems.
Posted: 22 May 2018 | Published: 31 Dec 2016

Farsight Security

Securing Office 365 with MobileIron
sponsored by MobileIron
WHITE PAPER: As more and more employees use Office 365 on mobile devices instead of on traditional PCs, it's become increasingly important, and difficult, to secure and deploy the app on mobile devices. Download this white paper to learn about an app security platform that solves these challenges.
Posted: 10 May 2018 | Published: 10 May 2018

MobileIron

2018 Beyond the Phish Report
sponsored by Wombat Security Technologies
ANALYST REPORT: In this Beyond the Phish report, uncover findings related to end-user risk, including identification of phishing threats, and a comparison of end-user knowledge levels across 16 industries.
Posted: 09 May 2018 | Published: 09 May 2018

Wombat Security Technologies

Protecting Against the Top 5 Attack Vectors
sponsored by Arctic Wolf Networks, Inc.
WHITE PAPER: Recently, there has been an abundance of cyberattacks in the news with popular companies, such as Uber and Equifax. Explore this resource to uncover how to protect against the top 5 attack vectors.
Posted: 09 Apr 2018 | Published: 09 Apr 2018

Arctic Wolf Networks, Inc.

Cybersecurity for the Modern Era: 3 Steps to Stopping Malware, Credentials Phishing, Email Fraud and More
sponsored by Proofpoint, Inc.
EBOOK: Discover 3 tips for choosing tools and solutions that will improve behaviors, outcomes, and next steps for combatting people-centered attacks with people-centered platforms.
Posted: 17 Sep 2018 | Published: 17 Sep 2018

Proofpoint, Inc.

Cybersecurity for the Modern Era: Choosing People-Centered Solutions
sponsored by Proofpoint, Inc.
EBOOK: Firewalls, intrusion detection and prevention systems, network defenses, endpoint antivirus software and the like are all important. But none of them address today's real security issue: people. Download this eBook to learn about different cyberattacks that specifically target people and how you can shape your security strategy to prevent them.
Posted: 07 Sep 2018 | Published: 07 Sep 2018

Proofpoint, Inc.

Email Security that Matters at the Macro-Security Level
sponsored by GreenPages Inc.
WHITE PAPER: Find out how digital transformation is expanding attack surfaces and learn how to defend against the email threats that traditional security approaches have failed to keep up with.
Posted: 12 Jul 2018 | Published: 12 Jul 2018

GreenPages Inc.

Mapping the Ransomware Landscape
sponsored by GreenPages Inc.
WHITE PAPER: Discover 5 key takeaways about the rapidly growing ransomware threat so that you can prepare your organization to defend against it proactively and effectively.
Posted: 11 Jul 2018 | Published: 31 Dec 2017

GreenPages Inc.

Ransomware Defense for Healthcare in 45 Seconds
sponsored by Cisco Umbrella
VIDEO: Hacking is big business, and healthcare is the number one targeted industry. Find out how advanced malware protection can keep patient data, research and your network safe.
Posted: 10 Jul 2018 | Premiered: 10 Jul 2018

Cisco Umbrella

Email Security in the Era of the Cloud: An Executive Brief
sponsored by SparkPost
WHITE PAPER: How secure is your email from hackers? This executive brief explores the successful attacks on organizations like the Democratic National Committee, Anthem Health, Sony Pictures and Seagate and how modern cloud platforms make the complex risks more manageable.
Posted: 25 Jun 2018 | Published: 25 Jun 2018

SparkPost

Human Factor Report 2018
sponsored by Proofpoint, Inc.
RESEARCH CONTENT: This 2018 Human Factor Report teaches you how to take action against the wide range of advanced threats. View now and learn how to identify and block targeted attacks that travel over email and other threat vectors.
Posted: 31 May 2018 | Published: 31 May 2018

Proofpoint, Inc.
1 - 25 of 318 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement