IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Email Security

RSS Feed   
ALSO CALLED: e-Mail Security, E Mail Security, Secure Email
DEFINITION: Vouch By Reference (VBR) is a protocol for adding third-party certification to email. The protocol has two parts, one for the sender and one for the receiver. The first part of the protocol requires the sender to add information to their email header by creating a field called VBR-Info. The information in the field tells the receiver three things: The sender's domain.The type of content the message  … 

Email Security definition sponsored by SearchExchange.com, powered by WhatIs.com an online computer dictionary
Email Security Reports
1 - 25 of 338 Matches Previous Page  |  Next Page
Case Study: Protecting Trusted Insiders
sponsored by Dtex
CASE STUDY: Recently, a slew of invoice-themed malicious phishing emails was found to have penetrated a customer network at a large energy company. What was worse? They had very limited visibility into the attack. Read this case study to learn how this organization was able to learn to identify, understand and mitigate a targeted phishing attack.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

Dtex

Financial Services Organization Stops Attack Targeting a Senior Executive
sponsored by Dtex
CASE STUDY: Even though this large financial services company had several AV, EDR, and email security tools deployed, a java backdoor attack still managed to slip through the cracks and land on the computer of a high-ranking employee. Learn how DTEX's detection and forensic capabilities were able to mitigate the threat.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

Dtex

Stopping BEC and EAC: Email Security in 2020
sponsored by Proofpoint
EBOOK: Email continues to be the leading vector in successful cyberattacks, leaving CISOs with the increasingly difficult responsibilities of protecting employee inboxes and stopping potential threats. Read this eBook for a comprehensive guide to stopping Business email compromise (BEC) and email account compromise (EAC) attacks.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

Proofpoint

9 Reasons Why Security Leaders Need to Re-Evaluate Email Security
sponsored by Zivver
WHITE PAPER: Access this white paper for the why, what and how of the 9 challenges organizations face to adequately protect data while still using ‘normal email’.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

Zivver

Plenty of Phish: Why We Need a New Approach to Email Security
sponsored by Darktrace
VIDEO: The shift towards remote workforces has introduced a series of new phishing and other email security threats. Unfortunately, inbox gateways and other traditional email security methods no longer cut it. Watch this webinar for a closer look at these new challenges and discover Darktrace’s Immune System Approach to email security.
Posted: 18 Nov 2020 | Premiered: 18 Nov 2020

Darktrace

What Is Phishing
sponsored by Claranet
EGUIDE: More than a decade after its first appearance, phishing remains the most common and pervasive type of cyberattack – but what is phishing? Who is at risk? And what kinds of attack variants are there? For answers to these, and more, read this Phishing Educational Guide.
Posted: 09 Nov 2020 | Published: 09 Nov 2020

Claranet

DDoS Extortion Battle Checklist
sponsored by Akamai Technologies
RESOURCE: Akamai has recently observed and mitigated an unprecedented number of extortion-driven DDoS attacks across numerous verticals, including manufacturing, gaming and financial services. Are you prepared to respond if you’re targeted? In this checklist, learn key attack responses and how best to work with a DDoS mitigation service provider.
Posted: 03 Nov 2020 | Published: 30 Oct 2020

Akamai Technologies

Making a DDoS Protection Plan: 8 Best Practices
sponsored by Akamai Technologies
RESOURCE: DDoS attackers launch hundreds of DDoS attacks every day. And when a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, whom to call or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared are your best defense against DDoS attacks.
Posted: 03 Nov 2020 | Published: 03 Nov 2020

Akamai Technologies

Isolation Best Practices for Financial Services Institutions
sponsored by Menlo Security
WHITE PAPER: Phishing and ransomware attacks, while not necessarily new, are becoming increasingly sophisticated, hard to detect, and dangerous. Read these isolation best practices for yourself to learn how smart financial service institutions are applying this relatively simple concept to stop dangerous attacks before they can reach vulnerable users.
Posted: 02 Nov 2020 | Published: 02 Nov 2020

Menlo Security

Ransomware State of Play
sponsored by Cylance
WEBCAST: Ransomware is evolving – campaigns are shifting from widespread to highly-targeted, often deployed via compromised MSSP. Additionally, Ransomware-as-a-Service (RaaS) is becoming more private, and threat actors are teaming up to extend their tooling. How can you stay secure? Watch this webcast to learn more about the state of play in ransomware.
Posted: 02 Nov 2020 | Premiered: Nov 2, 2020

Cylance

Securing the Future of Work
sponsored by Menlo Security
WHITE PAPER: Access this white paper to learn the top security threats posed to remote workers, use cases of cloud security that can cover the risk, and 4 steps to deploying a cloud-based secure web gateway (SWG) for remote workers with Menlo Security.
Posted: 02 Nov 2020 | Published: 02 Nov 2020

Menlo Security

Turn Your Phishing Links Into Read Only
sponsored by Menlo Security
WEBCAST: Check out this webcast to uncover the 3 email security limitations of Office 365 and discover how Menlo can ‘air gap” your enterprise network from the pubic web while still allowing employees seamless access to the internet.
Posted: 02 Nov 2020 | Premiered: Nov 2, 2020

Menlo Security

Prevent Fraud and Phishing Attacks With DMARC
sponsored by Mimecast
PRODUCT OVERVIEW: The FBI estimates that between 2013 and 2018, cybercriminals stole more than $12 billion using business email compromise (BEC) attacks. To prevent BEC and phishing, organizations are turning to email authentication tools. Read this Forrester report, which analyzes the features and capabilities of the DMARC standard.
Posted: 21 Oct 2020 | Published: 31 Mar 2020

Mimecast

Beyond the Perimeter- The Need for Pervasive Email Security
sponsored by Mimecast
ANALYST REPORT: Organizations are having a hard time protecting against modern email threats, especially since the move to cloud-delivered email systems. In this ESG Showcase, learn about Mimecast’s Email Security 3.0 Strategy that protects at the perimeter, inside the network and the organization, and beyond the perimeter.
Posted: 21 Oct 2020 | Published: 29 Feb 2020

Mimecast

Protecting the User: A Review of Mimecast’s Web Security Service
sponsored by Mimecast
ANALYST REPORT: Web browsers and email clients remain the most common points of entry and attack. Despite security awareness training and increasingly intelligent controls, unsuspecting employees are in the firing line for a bevy of developing cyberthreats. Fight back – view this SANS report to read a review of Mimecast’s Web Security service.
Posted: 20 Oct 2020 | Published: 31 Dec 2019

Mimecast

Unmasking BEC and EAC
sponsored by Proofpoint
EBOOK: Tap into The Complete Guide to Stopping Business Email Compromise, Email Account Compromise and Today’s Biggest Impostor Threats for concrete steps on how to keep your users safe.
Posted: 16 Oct 2020 | Published: 16 Oct 2020

Proofpoint

Technical Overview: Reducing Risk with a Remote Workforce
sponsored by SolarWinds, Inc.
WEBCAST: Working from home has drastically changed the IT security paradigm. This webinar provides an overview of those changes, highlights the current challenges and opportunities, and offers best practices for reducing risk for your remote workforce.
Posted: 09 Oct 2020 | Premiered: Oct 9, 2020

SolarWinds, Inc.

Making It Safe for Your People to Work Remotely
sponsored by Forcepoint
EBOOK: Given the current global pandemic, organizations have had to rapidly enable large amounts of remote workers – without compromising productivity or security. In this eBook, Making It Safe for Your People to Work Remotely, discover the risks associated with remote work and how to effectively address them.
Posted: 09 Oct 2020 | Published: 09 Oct 2020

Forcepoint

Security Without Compromise: A New Approach to Eliminating Malware
sponsored by Menlo Security
WEBCAST: 50% of all cyberattacks are based in malware, and 99% of those are driven by email and web attack vectors. How can organizations stay protected? A new way to reduce threats is through a method called ‘isolation.’ Gartner estimates that by 2022, isolation can reduce end-user system attacks by 70%. Interested? Watch this webcast for a closer look.
Posted: 09 Oct 2020 | Premiered: Oct 9, 2020

Menlo Security

Cisco Video Demo: Cisco Cloud Mailbox Defense
sponsored by Cisco
VIDEO: Organizations looking for a more effective security strategy against email threats need an up-close view of value. Cloud email tends to be vulnerable, and so it’s important to understand what technologies are available to defend it. View this demonstration of Cisco Cloud Mailbox Defense.
Posted: 08 Oct 2020 | Premiered: 08 Oct 2020

Cisco

Credential Harvesting: Virtually Hijacking Your Employee’s Credentials
sponsored by Inky Technology
RESOURCE: Credential harvesting is an approach often used by hackers to virtually hijack your employee’s accounts simply by using their password(s). In this INKY blog post, take a closer look at how credential harvesting works and what practices your organization can implement to minimize the risk.
Posted: 08 Oct 2020 | Published: 08 Oct 2020

Inky Technology

Cisco Cloud Mailbox Defense
sponsored by Cisco
DATA SHEET: As mailboxes move to the cloud, IT professionals are realizing that built-in email security will not be enough. Insider threats, account takeover and business email compromise loom larger than ever, and as such, it may be wise to consider supplementing your secure email gateway. See this data sheet to learn about Cisco Cloud Mailbox Defense.
Posted: 07 Oct 2020 | Published: 31 May 2020

Cisco

e-book: Securing Microsoft 365 Email Against Advanced Threats
sponsored by Cisco
EBOOK: Businesses are migrating to cloud email platforms for improved productivity, mobility, and continual access to the latest tools and features. But there’s a catch. Cloud-based email has left users and devices open to new threats and vulnerabilities. Read this e-book to explore these risks, particularly in the context of Microsoft 365.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

Cisco

Are Your Remote Workers Sitting Ducks?
sponsored by Mimecast
WHITE PAPER: COVID-19 has resulted in working from home becoming common practice– and it could stay that way for the foreseeable future. But are remote workers sitting ducks for cyberattacks? A new Mimecast-iTnews survey of Australian organizations suggests that many are just that. Download this white paper to learn more.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

Mimecast

Cloud Email Needs Cloud Security
sponsored by Cisco
RESOURCE: 90% of breaches occur via email, and in today’s cloud-centric world, built-in email security may not be enough. In order to secure Microsoft 365 from threats inside and outside of your mailbox, businesses need to consider email security that’s built for the cloud. View this infographic to learn more and to discover another security opportunity.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

Cisco
1 - 25 of 338 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info