IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  

Email Spoofing

RSS Feed   
Email Spoofing Reports
 
Successful Phishing Attacks at a Northeastern US College Drop by 90%
sponsored by Wombat Security Technologies
CASE STUDY: According to the Verizon DBIR, 44% of breaches in the education sector involve social attacks, including email. Explore this case study to gain insight into how one public college revamped its cybersecurity approach after falling victim to a damaging email attack.
Posted: 27 Feb 2018 | Published: 27 Feb 2018

Wombat Security Technologies

Building a Threat Intelligence Program
sponsored by ThreatConnect
RESEARCH CONTENT: Cybersecurity decision makers overwhelmingly agree that their organizations should be investing more in their threat intelligence programs. In this report, uncover research findings from 351 cybersecurity decision makers in the U.S. on best practices and impact of building a threat intelligence program.
Posted: 08 Oct 2018 | Published: 08 Oct 2018

ThreatConnect

State of the Phish 2018
sponsored by Wombat Security Technologies
RESEARCH CONTENT: According to Wombat Security's State of the Phish 2018 Report, 76% of respondents said they experienced phishing attacks in 2017. This report helps CISOs and their teams identify opportunities to more effectively manage end-user risk within their organizations.
Posted: 26 Feb 2018 | Published: 26 Feb 2018

Wombat Security Technologies

Protecting Commercial Online Banking Customers from Next-Generation Malware
sponsored by IronKey
WHITE PAPER: Cybercriminals are now using advanced malicious software (malware) to attack the computers of finance professionals in companies and government agencies. Read this paper now to learn how your business can stay protected from these threats.
Posted: 22 Nov 2010 | Published: 22 Nov 2010

IronKey

Phishing and Web Security
sponsored by Webroot
WHITE PAPER: This brief whitepaper explores why businesses need to prepare for phishing 2.0 and why this new cybercrime is aiming its sights at your business.
Posted: 29 Apr 2014 | Published: 31 Dec 2013

Webroot

Phishing: The Latest Tactics And Potential Business Impacts
sponsored by Symantec
WHITE PAPER: This informative guide takes an in-depth look at phishing and how it has become an effective tactic for cybercriminals.
Posted: 14 May 2014 | Published: 14 May 2014

Symantec

Protecting People: A Quarterly Analysis of Highly Targeted Attacks
sponsored by Proofpoint, Inc.
RESOURCE: Uncover the shocking survey results from this summer 2018 report where you can find for some key insights into whose being attacked, how they're being targeted, and what you can do about it.
Posted: 17 Sep 2018 | Published: 17 Sep 2018

Proofpoint, Inc.

Case Study: Endpoint Security & Data Protection
sponsored by enSilo
CASE STUDY: Take a look at this case study to discover how a manufacturing enterprise overcame its issue of external attackers taking down production by invading personal data and endpoints.
Posted: 28 Feb 2018 | Published: 28 Feb 2018


Study commissioned by Webroot: Web Threats Expose Businesses to Data Loss
sponsored by Webroot
WHITE PAPER: Eight in 10 companies experienced web-borne attacks in 2012. Don't be part of the statistic! Read this research paper to learn about the current state of web layer security in organizations today and learn what you should do to stay protected.
Posted: 20 Mar 2013 | Published: 06 May 2013

Webroot

"Hacking as a Service," and Other Emerging Threats
sponsored by SearchSecurity.com
EZINE: Lethal threats to enterprise security are emerging from every which way. Access this exclusive edition of Information Security Magazine to learn just what you're up against.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

SearchSecurity.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement