IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  

Email Spoofing

RSS Feed   
Email Spoofing Reports
 
Webinar - Defend Better and Respond Faster With Security That Works Together
sponsored by Cisco Umbrella
WEBCAST: Most malware infections happen in one of only 3 ways, so why aren’t they easier to stop? As organizations embrace the cloud, it’s now imperative to find a new approach to securing users and devices. View this webinar to find out how to stop attacks before they start and how to safeguard your organization with a layered approach to cybersecurity.
Posted: 31 Jul 2020 | Premiered: Jul 14, 2020

Cisco Umbrella

Email Risk Assessment Report
sponsored by 365iTMS
ANALYST REPORT: Email security is much talked about right now, and it’s important that you’re up to date on the scale at which it’s under attack, the most popular types of malware bad actors are using and the vulnerability of email in general. Access the Email Risk Assessment Report to understand these trends and to pick up 7 recommendations on email safety.
Posted: 12 Feb 2021 | Published: 12 Feb 2021


Work from Home Securely by Following these Simple Tips
sponsored by Zivver
WHITE PAPER: Businesses are still getting used to remote employees, and as such, security concerns are still being raised. But these remote employees can help ease some of these concerns by being more mindful about IT security. Study this article to learn 8 security tips for keeping your work-from-home environment on lockdown.
Posted: 08 Feb 2021 | Published: 03 Feb 2021

Zivver

Dually Deceptive: Two New Phishing Scams Swimming by Your SEG
sponsored by Inky Technology
RESOURCE: Phishing scams have been more than pervasive in 2020, with the APWG counting 139,685 unique phishing threats in Q1 alone. As these attacks are quickly becoming more sophisticated, targeted and illusive, it’s a good idea to understand their complexity as they evolve. Jump into this short article to learn about two of these new scams.
Posted: 05 Oct 2020 | Published: 05 Oct 2020

Inky Technology

Why are Acronis Cyber Protection Solutions Threat-Agnostic?
sponsored by Acronis
WHITE PAPER: Security professionals must both account for the many types of cyberattacks and apply security controls to different vectors through which these attacks can make their way in. In this white paper, read up on threat vectors, cyberattack techniques, types of malware and fileless attacks, and see how Acronis can help you fight them all.
Posted: 28 Jan 2021 | Published: 31 Dec 2020

Acronis

DTEX and Phishing
sponsored by Dtex
CASE STUDY: Phishing shows no signs of slowing down. It’s responsible for more than 90% of incidents and data breaches driven by social engineering, with 66% of malware reportedly installed via malicious email attachments. Vigilance is key. View this case study to find out how DTEX was able to help an energy company locate the origin of a phishing attack.
Posted: 18 Aug 2020 | Published: 18 Aug 2020

Dtex

Using Farsight Passive DNS
sponsored by Farsight Security
WHITE PAPER: For a hacker, the efficiency and ease-of-use of DNS-related phishing attacks is second to none. In fact, one Verizon study found phishing to be the #1 cause of data breaches. Download this white paper to learn more about Farsight’s Passive DNS tool, which embraces NIST’s 4-phase incident response lifecycle to help you thwart DNS-related threats.
Posted: 15 Jun 2020 | Published: 31 Jul 2019

Farsight Security

Modernize Your Approach to Authentication
sponsored by SearchSecurity.com
EBOOK: This white paper can help you discover why attackers can target the token vendor to take advantage of the security of the authentication system as a whole and how you can replace the ubiquitous authenticator in your business.
Posted: 06 Aug 2012 | Published: 06 Aug 2012

SearchSecurity.com

Phishing: The Latest Tactics And Potential Business Impacts
sponsored by Symantec
WHITE PAPER: This informative guide takes an in-depth look at phishing and how it has become an effective tactic for cybercriminals.
Posted: 14 May 2014 | Published: 14 May 2014

Symantec

The Custom Defense - Your Answer to APTs
sponsored by Trend Micro
VIDEO: Explore an innovative new technology available to help your organization combat potentially disastrous advanced persistent threats (APTs).
Posted: 17 Apr 2013 | Premiered: 17 Apr 2013

Trend Micro
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info