IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

Email Security

RSS Feed   
ALSO CALLED: e-Mail Security, E Mail Security, Secure Email
DEFINITION: Vouch By Reference (VBR) is a protocol for adding third-party certification to email. The protocol has two parts, one for the sender and one for the receiver. The first part of the protocol requires the sender to add information to their email header by creating a field called VBR-Info. The information in the field tells the receiver three things: The sender's domain.The type of content the message  … 

Email Security definition sponsored by SearchExchange.com, powered by WhatIs.com an online computer dictionary
Email Security Reports
1 - 25 of 225 Matches Previous Page  |  Next Page
Forrester Now Tech - Enterprise Email Security Providers
sponsored by Trustifi
EBOOK: PH
Posted: 22 Nov 2021 | Published: 22 Nov 2021

TOPICS:  Email Security

Remote Employee Security Playbook
sponsored by Trustifi
EBOOK: PH
Posted: 22 Nov 2021 | Published: 22 Nov 2021

TOPICS:  Email Security

The Dangerous Costs of Business Email Compromise
sponsored by Trustifi
EBOOK: PH
Posted: 22 Nov 2021 | Published: 22 Nov 2021

TOPICS:  Email Security

SEGs Are Dead
sponsored by Trustifi
EBOOK: PH
Posted: 22 Nov 2021 | Published: 22 Nov 2021

TOPICS:  Email Security

7 of the Biggest Phishing Scams of All Time
sponsored by Inky Technology
WHITE PAPER: Falling for a phishing attack isn’t just annoying—for some companies, phishing attacks can cost hundreds of millions of dollars and incalculable reputational damage. Read this short blog post to learn how 7 of the biggest phishing scams of all time happened and discover some strategies you can use to make sure you don’t join that ignominious list.
Posted: 12 Oct 2021 | Published: 12 Oct 2021

TOPICS:  Email Security
Inky Technology

INKY Computer Vision
sponsored by Inky Technology
VIDEO: MSPs need to know that they’re being protected from ransomware and other dangerous security threats that come from phishing emails. Watch this short video to learn how INKY’s computer vision technology helps identify even the most advanced of fake emails that would typically fool an end user.
Posted: 12 Oct 2021 | Premiered: 21 Mar 2021

Inky Technology

How a Ransomware Attack Unfolds
sponsored by Inky Technology
WHITE PAPER: As recent, high-profile attacks have highlighted, ransomware (often perpetrated via phishing) is a huge risk for MSPs worldwide. Access this INKY white paper to learn how phishing attacks play out, explore strategies you can use to fight them, and discover how INKY’s mathematical and behavioral models stop ransomware attacks before they happen.
Posted: 07 Oct 2021 | Published: 07 Oct 2021

Inky Technology

Why INKY for Managed Services?
sponsored by Inky Technology
WHITE PAPER: INKY, a cloud-based email security platform designed with MSPs in mind, offers simple but powerful protection that is easy to deploy and manage. Access this short white paper to learn what makes INKY’s security offering attractive to so many businesses.
Posted: 07 Oct 2021 | Published: 07 Oct 2021

Inky Technology

Which deployment model is right for me?
sponsored by Inky Technology
WHITE PAPER: While many businesses now offer API-based solutions to enhance email security, particularly aimed at phishing, these tactics aren’t always the best approach. Access this white paper to learn how inline email security differs from API-based security and discover why INKY thinks that their standard model works best for customers.
Posted: 06 Oct 2021 | Published: 06 Oct 2021

Inky Technology

Does Office 365 Deliver The Email Security And Resilience Enterprises Need?
sponsored by Mimecast
WHITE PAPER: The native security capabilities of most cloud-based email infrastructures, like Microsoft 365, are often easier for cybercriminals to bypass compared to third-party alternatives. Read this white paper to learn more about what it takes to protect cloud email inboxes against today’s advanced cyberthreats.
Posted: 14 Jul 2021 | Published: 14 Jul 2021

TOPICS:  Email Security
Mimecast

How Small Businesses Overcome Email And Security Challenges
sponsored by Mimecast
ANALYST REPORT: Small and medium-sized businesses (SMBs) often lack the resources of larger enterprises, requiring them to be more thoughtful when designing their security programs. Read this Osterman Research report to learn about the email-based cyberthreats targeting SMBs and what they can do to better protect their inboxes.
Posted: 13 Jul 2021 | Published: 30 Sep 2020

TOPICS:  Email Security
Mimecast

Computer Weekly – 27 April 2021: Justice at last in Post Office IT scandal
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, 12 years after we broke the story, victims of the Post Office IT scandal finally have their criminal convictions overturned. We take a virtual tour of a Microsoft datacentre and meet a server called 'Mega-Godzilla Beast'. And we find out how technology is transforming Nationwide Building Society. Read the issue now.
Posted: 26 Apr 2021 | Published: 27 Apr 2021

ComputerWeekly.com

Securing the Enterprise in the COVID world
sponsored by Mimecast
EBOOK: Dive into this report for the key findings from Mimecast’s 2021 state of email security survey on the DMARC standard, cybersecurity awareness training, the post-COVID threat landscape, and more.
Posted: 23 Apr 2021 | Published: 23 Apr 2021

TOPICS:  Email Security
Mimecast

Computer Weekly - 20 April 2021: Shop and go – will Amazon's cashless 'just walk out' store work?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, Amazon has opened its first 'just walk out' grocery store in the UK, but is it the right time to hit the high street? We examine the human and technical issues around email security. And we analyse Microsoft's $19bn purchase of voice recognition supplier Nuance. Read the issue now.
Posted: 16 Apr 2021 | Published: 20 Apr 2021

ComputerWeekly.com

Understanding Phishing: Banner Effectiveness
sponsored by Inky Technology
WHITE PAPER: Putting banners in email to alert recipients to the potential dangers lurking in messages can be a highly effective way to keep employees safe from phishing attacks. But for this to be effective, you have to know which emails to flag. View this white paper to learn how INKY’s Phish Fence determines which emails to warn users about.
Posted: 12 Apr 2021 | Published: 12 Apr 2021

Inky Technology

MANAGED XDR - MANAGED DETECTION AND RESPONSE SERVICE
sponsored by Trend Micro
DATA SHEET: Today’s attacks are dangerous – monetizing intellectual property, encrypting essential data for ransom or damaging the flow of information in the case of nation state attacks. Managed extended detection and response (XDR) can provide 24/7 protection from these attacks. View this Trend Micro data sheet to see the full security layer.
Posted: 26 Feb 2021 | Published: 26 Feb 2021

Trend Micro

State Of Malware Report
sponsored by Malwarebytes
ANALYST REPORT: As the world was dealing with a global pandemic, cybercriminals ditched some old tactics and focused more on gathering intelligence. Simultaneously, ransomware gangs continued to learn from each other, with successful tactics spreading quickly between them. Download this report to learn more about how cybercrime and cybersecurity changed in 2020.
Posted: 23 Feb 2021 | Published: 23 Feb 2021

Malwarebytes

Spear Phishing: Top Threats and Trends Vol. 5
sponsored by Barracuda
RESEARCH CONTENT: As their speedy exploitation of fears around the COVID-19 pandemic show, cybercriminals adapt quickly to current events and new tactics. This in-depth report takes a look at the evolving trends in spear-phishing and the new ways attackers are tricking their victims – read on unlock this exclusive insight.
Posted: 29 Dec 2020 | Published: 29 Dec 2020

Barracuda

Spear Phishing vol4: Impersonations are increasingly more common, sophisticated and targeted.
sponsored by Barracuda
WHITE PAPER: Spear phishing, alongside other impersonation attacks, are on the rise, and new tactics are making it more difficult to differentiate between an impersonation attempt and a genuine message. Read on to discover the top 3 spear phishing impersonation attacks to keep an eye on.
Posted: 23 Dec 2020 | Published: 23 Dec 2020

Barracuda

Leading private hospital consolidates email protection to secure VIP guests’ data “Crown Jewels”
sponsored by Barracuda
CASE STUDY: Healthcare is one of the most frequently targeted verticals and patient data has grown in value to cybercriminals. This case study follows how Richard Andrews, Head of IT at King Edward VII’s hospital in London, was able to implement email security for his most vulnerable patients – including members of the Royal Family.
Posted: 21 Dec 2020 | Published: 21 Dec 2020

Barracuda

Top 10 Capabilities that Organizations Need in a Secure Email Gateway: A buyer’s guide
sponsored by Mimecast
EBOOK: With the proliferation of advanced threat techniques in today’s ecosystem, organizations are adopting secure email gateways (SEGs) for a multi-layered approach against email-borne threats. How can you be sure you’re considering the right one? This buyer’s guide details the 10 most important capabilities organizations should seek in a SEG solution.
Posted: 08 Dec 2020 | Published: 08 Dec 2020

Mimecast

Taking The Mystery Out Of Protecting Your Office 365 Data
sponsored by arcserve
RESOURCE: Microsoft Office 365 lets you work anywhere, anytime with on-premises and cloud SaaS, IaaS and PaaS-based solutions. But while Microsoft takes care of the infrastructure for these services, it’s up to you to take care of your data. Scope out this infographic to learn how you could achieve cloud-to-cloud protection for Office 365.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

arcserve

Prevent Fraud And Phishing Attacks With DMARC
sponsored by Mimecast
PRODUCT OVERVIEW: The FBI estimates that between 2013 and 2018, cybercriminals stole more than $12 billion using business email compromise (BEC) attacks. To prevent BEC and phishing, organisations are turning to email authentication tools. Read this Forrester report, which analyzes the features and capabilities of the DMARC standard.
Posted: 21 Oct 2020 | Published: 31 Mar 2020

Mimecast

Beyond the Perimeter
sponsored by Mimecast
ANALYST REPORT: Organizations are having a hard time protecting against modern email threats, especially since the move to cloud-delivered email systems. In this ESG Showcase, learn about Mimecast’s Email Security 3.0 Strategy that protects at the perimeter, inside the network and the organization, and beyond the perimeter.
Posted: 21 Oct 2020 | Published: 29 Feb 2020

Mimecast

Are your remote workers sitting ducks?
sponsored by Mimecast
WHITE PAPER: COVID-19 has resulted in working from home becoming common practice– and it could stay that way for the foreseeable future. But are remote workers sitting ducks for cyberattacks? A new Mimecast-iTnews survey of Australian organisations suggests that many are just that. Download this white paper to learn more.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

Mimecast
1 - 25 of 225 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences