IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Email Security

RSS Feed   
ALSO CALLED: e-Mail Security, E Mail Security, Secure Email
DEFINITION: Vouch By Reference (VBR) is a protocol for adding third-party certification to email. The protocol has two parts, one for the sender and one for the receiver. The first part of the protocol requires the sender to add information to their email header by creating a field called VBR-Info. The information in the field tells the receiver three things: The sender's domain.The type of content the message  … 

Email Security definition sponsored by SearchExchange.com, powered by WhatIs.com an online computer dictionary
Email Security Reports
1 - 25 of 307 Matches Previous Page  |  Next Page
The Sunshine Laws, Freedom of Information and Compliance
sponsored by Egress Software Technologies Inc
CASE STUDY: Learn how you can use Egress to minimize response time to information requests and avoid a costly violation.
Posted: 21 May 2020 | Published: 21 May 2020

Egress Software Technologies Inc

Spear Phishing: Top Threats and Trends
sponsored by Barracuda
WHITE PAPER: Business email compromise (BEC) is an emerging cybersecurity threat that targets user inboxes. While BEC makes up just 7% of spear-phishing attacks, it’s responsible for over $26 billion in losses in the last four years. In this report, explore the latest BEC tactics used by scammers and best practices for protecting your organization.
Posted: 18 May 2020 | Published: 30 Nov 2019

Barracuda

The Big Easy - 3 steps for better security
sponsored by Cisco Umbrella
VIDEO: In this video, take a look at the 3 most common threat vectors, and discover best-practices for detecting, isolating and mitigating these threats before they have a chance to strike.
Posted: 15 May 2020 | Premiered: 11 Dec 2019

Cisco Umbrella

Use Your Microsoft Certificate Authority for Passwordless Authentication
sponsored by Entrust, Inc.
PRODUCT OVERVIEW: As a result of the growing risks of weak passwords, organizations are looking beyond passwords towards passwordless authentication. In this solution brief, discover the key features of Entrust Datacard’s passwordless authentication offering, designed to ensure a seamless, secure user experience.
Posted: 11 May 2020 | Published: 11 May 2020

Entrust, Inc.

Cool Vendors in Cloud Office Security
sponsored by Armorblox
RESOURCE: As organizations continue to embrace the operational benefits of cloud office suites, security leaders need to ensure that data protection isn’t overlooked. In this Gartner report, take an in-depth look at four key vendors and their innovative approaches to cloud office security, email and collaboration.
Posted: 11 May 2020 | Published: 01 May 2020

Armorblox

13 Email Threat Types to Know about Right Now
sponsored by Barracuda
RESOURCE: As email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.
Posted: 07 May 2020 | Published: 01 May 2020

Barracuda

Securing Your Business During the COVID-19 Crisis
sponsored by Barracuda
WEBCAST: Like you, Barracuda is adjusting to having everybody working from home. That’s why they’ve created a new webinar that shares insights about the key security challenges that this change entails, and how to overcome them. View now to gain actionable insights about how to keep your business secure in this extraordinary time.
Posted: 05 May 2020 | Premiered: May 5, 2020

Barracuda

Evolution of Email Security
sponsored by Barracuda
WEBCAST: Ever since it became a critical tool for business communications, email has been the target of increasingly sophisticated cyberattacks. In this webinar, join Barracuda security experts as they overview the evolution of email security from early inbox threats to campaigns taking advantage of the current pandemic.
Posted: 04 May 2020 | Premiered: May 4, 2020

Barracuda

2019 eSentire Annual Threat Intelligence Report
sponsored by eSentire
ANALYST REPORT: Eliminate guesswork and get in-depth insights and practical recommendations for navigating the ever-changing cybercrime landscape. Download this report to learn what attacks are targeting mid-sized organizations and the security strategies you need to safeguard your business.
Posted: 24 Apr 2020 | Published: 24 Apr 2020

eSentire

Barracuda Forensics and Incident Response
sponsored by Barracuda
VIDEO: When it comes to email-based threats, incident response is traditionally a manual process that costs time and money. In this short video, take a closer look at the key features of Barracuda Forensics and Incident Response, which is designed to replace outdated methods with an automated, data-driven approach.
Posted: 24 Apr 2020 | Premiered: 24 Apr 2020

Barracuda

A Guide to DNS Security & How it Addresses DDoS Attacks
sponsored by TechTarget
RESOURCE: DDoS attacks are unique in the way that target and infect an organizations bandwidth, leading to long downtimes and costly disruptions. Written by out networks security experts, our DDoS e-guide explores the anatomy of various DDoS attacks and offers best practices for defending against them. Take our short survey to receive your free copy.
Posted: 23 Apr 2020 | Published: 04 May 2020

TechTarget

Barracuda Essentials Overview
sponsored by Barracuda
VIDEO: In this short video, learn how you can protect your business from advanced email threats like ransomware, phishing, and data loss with Barracuda Essentials.
Posted: 22 Apr 2020 | Premiered: 22 Apr 2020

Barracuda

Five Security Priorities to Consider with a Remote Workforce
sponsored by Ivanti SEA
RESOURCE: Network security is just one of the countless business operation areas affected by the spread of COVID-19. Email-based cyberattacks are on the rise, and networks have never been more vulnerable. In this article, discover 5 strategic recommendations for how to prioritize security in these trying times.
Posted: 21 Apr 2020 | Published: 26 Mar 2020

Ivanti SEA

Protecting Business and Remote Workers from COVID-19 Email Threats
sponsored by Barracuda
VIDEO: The recent shift to working remotely as a result of the spread of COVID-19 has made organizations more vulnerable to email-based cyberattacks. This webinar breaks down the various methods being used by hackers and offers best practices for protecting your business and workers.
Posted: 21 Apr 2020 | Premiered: 21 Apr 2020

Barracuda

Maintaining ‘Business as Usual’ In Unusual Circumstances
sponsored by ProAct
WHITE PAPER: Each year, cyberattackers implement new ways to bypass security tactics and trigger costly disruptions to business operations. However, with the right preparation your IT security team can be positioned to deal with these dangers. In this white paper, take a closer look at today’s threat vectors and learn your team can overcome them.
Posted: 20 Apr 2020 | Published: 20 Apr 2020

ProAct

2020 State of Malware Report
sponsored by Malwarebytes
WHITE PAPER: Each year, cybercriminals come up with more creative ways to infect organizations, devices and users in order to cause disruptions. In this 2020 State of Malware Report, take a closer look at some of the key attack trends in 2019 and see how the threat landscape has evolved over the last decade.
Posted: 14 Apr 2020 | Published: 29 Feb 2020

Malwarebytes

WEBINAR: Protecting Against Coronavirus Email Fraud
sponsored by Armorblox
VIDEO: Socially engineered attacks are always aligned with what people are talking (or worried) about. So, it should come as no surprise that record amounts of cyberattacks have been using the current Coronavirus pandemic as a lure to cause disruptions. Watch this webinar to learn more about their tactics and how to spot them.
Posted: 14 Apr 2020 | Premiered: 08 Apr 2020

Armorblox

How Vendor Email Compromise Works
sponsored by Armorblox
WHITE PAPER: The FBI updated their estimate of how much money was lost due to Business Email Compromise (BEC) attacks to $26 billion over the past three years, making it one of the costliest forms of cyberattack. Recently, Vendor Email Compromise (VEC), a variant of BEC, has emerged. In this blog post, learn more about VEC and how it differs from BEC.
Posted: 14 Apr 2020 | Published: 14 Apr 2020

Armorblox

Cloud App Security Report Infographic
sponsored by Trend Micro
RESOURCE: Although less than 400,000 business email compromise (BEC) attacks were recorded in 2019, they accounted for half of all cybercrime losses in 2019 ($1.7 billion). Download this email security threats infographic to learn more about the prevalence of BEC attacks in 2019, as well as phishing and other malware attacks.
Posted: 13 Apr 2020 | Published: 13 Apr 2020

Trend Micro

Coronavirus Credential Phishing
sponsored by Armorblox
WHITE PAPER: As the spread of the Coronavirus continues to create a sense of uncertainty, cyberattackers have been pushing their efforts to capitalize on people’s doubts and fears. In this white paper, dissect an example of a credential phishing attack: what theses attacks consist of, why it got through & how it was detected.
Posted: 13 Apr 2020 | Published: 13 Apr 2020

Armorblox

Egress Intelligent Email Security for Banks and Credit Unions
sponsored by Egress Software Technologies Inc
DATA SHEET: Learn how Egress Intelligent Email Security uses powerful contextual machine learning to ensure emails are delivered to the correct recipient with the right level of security applied.
Posted: 09 Apr 2020 | Published: 09 Apr 2020

Egress Software Technologies Inc

Boosting Cybersecurity Immunity: Confronting Risks in Today’s Work-From-Home world
sponsored by Capgemini
WHITE PAPER: The spread of COVID-19 has led to a massive and dramatic shift towards working from home and a major increase in email attacks. Learn how you can address the heightened cybersecurity risks that come with the shift towards remote workers and mobile devices.
Posted: 09 Apr 2020 | Published: 09 Apr 2020

Capgemini

Augmenting Native Office 365 Email Security to Stop Targeted Email Attacks
sponsored by Armorblox
WHITE PAPER: Email remains the top communication method within and among businesses. In order to take advantage of this, cyberattackers develop targeted campaigns that focus on tricking users into clicking on malware. In this white paper, learn how to complement your existing Office 365 security features with third-party services to stop email attacks.
Posted: 09 Apr 2020 | Published: 09 Apr 2020

Armorblox

Creating a Security Culture at Your Business
sponsored by TechData - Microsoft
VIDEO: The most persistent threat to the security of an organization is its own employees. 2/3 of employees use the same password everywhere, and too few can recognize a genuine email from a phishing scam. In this video, learn how Microsoft may be able to address these challenges and help you form a security culture.
Posted: 08 Apr 2020 | Premiered: 24 Jan 2020

TechData - Microsoft

How to Protect Data with Microsoft 365 Business
sponsored by TechData - Microsoft
RESOURCE: 52% of today’s data leaks are the result of human error – from bad password practices to email scams. In order to overcome these challenges, organizations should equip employees with the knowledge and tools to better understand threats. This infographic illustrates how Microsoft 365 Business can help your organization protect its data.
Posted: 08 Apr 2020 | Published: 08 Apr 2020

TechData - Microsoft
1 - 25 of 307 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info