IT Management  >   Systems Operations  >   Security  >   Security Threats  >  

Email Threats

RSS Feed   
ALSO CALLED: Threats
DEFINITION: Vulnerabilities in an email message.
Email Threats Reports
1 - 25 of 85 Matches Previous Page  |  Next Page
Ransomware Tabletop Exercise
sponsored by CI Security
WEBCAST: Most organizations don’t have a plan to react to ransomware, and the ones that do may not have fully updated it. Be prepared for the worst – watch this webcast to see Mike Simon, CTO of CI Security, lead a 60-minute virtual tabletop exercise featuring a ransomware attack simulation and how a company responds to it.
Posted: 07 Jan 2021 | Premiered: Dec 8, 2020

CI Security

A Smarter Way for Email Security + Cloud Collaboration Compliance
sponsored by Clearedin
DATA SHEET: Today’s volatile security ecosystem has left organizations scrambling to compliantly secure their email servers. And with the cloud seeing so much use, it can be difficult to know which software will keep you out of the woods. In this solution brief, you can explore how Clearedin is helping businesses to compliantly collaborate in the cloud.
Posted: 06 Jan 2021 | Published: 06 Jan 2021

Clearedin

Clearedin Office 365, Exchange Online Protection (EOP) and Secure Email Gateway (SEG) Solution
sponsored by Clearedin
WHITE PAPER: Office 365 (O365) applications are used by many in the rapidly expanding remote workforce. However, while these apps have native anti-phishing measures in place, you may need additional layers of protection to prepare for more sophisticated threats. Click here to learn how to properly supplement your O365 security.
Posted: 05 Jan 2021 | Published: 05 Jan 2021

Clearedin

Ransomware Playbook
sponsored by AWS Rapid7
EBOOK: Victims of ransomware attacks suffer the impact of productivity and revenue loss due to work stoppage. Plus, these businesses are likely to have to manage communications with the press, customers, prospects and vendors. It’s time to start taking action and lower your ransomware risk. This e-book provides ample first steps.
Posted: 11 Dec 2020 | Published: 11 Dec 2020

AWS Rapid7

Omdia Market Radar: Outbound Email Security
sponsored by Zivver
WHITE PAPER: When it comes to email security, organizations put their primary focus on potential threats coming in. And that’s fine, but outbound email security is arguably just as important. Browse this white paper to get a closer look at outbound email data protection, which focuses on building controls to offset risks from the insider threat.
Posted: 09 Dec 2020 | Published: 09 Dec 2020

Zivver

Eliminate the Threat of Exfiltrative, Extortive Ransomware
sponsored by Atakama
RESOURCE: Maze ransomware involves developers and ‘affiliates’ leveraging ransomware-as-a-services technology to actually scale ransomware attacks. It first appeared in May 2019, and with ransomware damage costs projected to reach $20 billion by 2021, the time to invest in ransomware defense is now. Browse this article to see how Atakama can help.
Posted: 07 Dec 2020 | Published: 08 Jul 2020

Atakama

Phishing: Not Just One Kind of Attack
sponsored by Atakama
RESOURCE: Phishing attacks utilize a wide range of ever-evolving techniques to steal data, from impersonating executives to targeting and duping unsuspecting employees. How can you better understand these scams? This article breaks down common schemes, their targets and their indicators, and gives a solution from Atakama for keeping these threats at bay.
Posted: 07 Dec 2020 | Published: 19 Aug 2020

Atakama

Taking the Mystery Out of Protecting Your Office 365 Data
sponsored by arcserve
RESOURCE: Microsoft Office 365 lets you work anywhere, anytime with on-premises and cloud SaaS, IaaS and PaaS-based solutions. But while Microsoft takes care of the infrastructure for these services, it’s up to you to take care of your data. Scope out this infographic to learn how you could achieve cloud-to-cloud protection for Office 365.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

arcserve

Case Study: Protecting Trusted Insiders
sponsored by Dtex
CASE STUDY: Recently, a slew of invoice-themed malicious phishing emails were found to have penetrated a customer’s network at a large energy company. What was worse? They had very limited visibility into the attack. Read this case study to learn how this organization was able to identify, understand and mitigate future targeted phishing attacks.
Posted: 23 Nov 2020 | Published: 23 Nov 2020

Dtex

Stopping BEC and EAC: Email Security in 2020
sponsored by Proofpoint
EBOOK: Email continues to be the leading vector in successful cyberattacks, leaving CISOs with the increasingly difficult responsibilities of protecting employee inboxes and stopping potential threats. Read this eBook for a comprehensive guide to stopping Business email compromise (BEC) and email account compromise (EAC) attacks.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

Proofpoint

DDoS Extortion Battle Checklist
sponsored by Akamai Technologies
RESOURCE: Akamai has recently observed and mitigated an unprecedented number of extortion-driven DDoS attacks across numerous verticals, including manufacturing, gaming and financial services. Are you prepared to respond if you’re targeted? In this checklist, learn key attack responses and how best to work with a DDoS mitigation service provider.
Posted: 03 Nov 2020 | Published: 30 Oct 2020

Akamai Technologies

Making a DDoS Protection Plan: 8 Best Practices
sponsored by Akamai Technologies
RESOURCE: DDoS attackers launch hundreds of DDoS attacks every day. And when a DDoS attack strikes an organization, panic is common. No one knows why systems and applications are failing, whom to call or what questions to ask. Meanwhile, senior leaders want answers. Planning ahead and being prepared are your best defense against DDoS attacks.
Posted: 03 Nov 2020 | Published: 03 Nov 2020

Akamai Technologies

Ransomware State of Play
sponsored by Cylance
WEBCAST: Ransomware is evolving – campaigns are shifting from widespread to highly-targeted, often deployed via compromised MSSP. Additionally, Ransomware-as-a-Service (RaaS) is becoming more private, and threat actors are teaming up to extend their tooling. How can you stay secure? Watch this webcast to learn more about the state of play in ransomware.
Posted: 02 Nov 2020 | Premiered: Nov 2, 2020

Cylance

Cisco Video Demo: Cisco Cloud Mailbox Defense
sponsored by Cisco
VIDEO: Organizations looking for a more effective security strategy against email threats need an up-close view of value. Cloud email tends to be vulnerable, and so it’s important to understand what technologies are available to defend it. View this demonstration of Cisco Cloud Mailbox Defense.
Posted: 08 Oct 2020 | Premiered: 08 Oct 2020

Cisco

Cisco Cloud Mailbox Defense
sponsored by Cisco
DATA SHEET: As mailboxes move to the cloud, IT professionals are realizing that built-in email security will not be enough. Insider threats, account takeover and business email compromise loom larger than ever, and as such, it may be wise to consider supplementing your secure email gateway. See this data sheet to learn about Cisco Cloud Mailbox Defense.
Posted: 07 Oct 2020 | Published: 31 May 2020

Cisco

e-book: Securing Microsoft 365 Email Against Advanced Threats
sponsored by Cisco
EBOOK: Businesses are migrating to cloud email platforms for improved productivity, mobility, and continual access to the latest tools and features. But there’s a catch. Cloud-based email has left users and devices open to new threats and vulnerabilities. Read this e-book to explore these risks, particularly in the context of Microsoft 365.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

Cisco

Cloud Email Needs Cloud Security
sponsored by Cisco
RESOURCE: 90% of breaches occur via email, and in today’s cloud-centric world, built-in email security may not be enough. In order to secure Microsoft 365 from threats inside and outside of your mailbox, businesses need to consider email security that’s built for the cloud. View this infographic to learn more and to discover another security opportunity.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

Cisco

Hidden Text and Zero Font Attacks
sponsored by Inky Technology
RESOURCE: You may have heard that some phishing emails use something called zero font — text hidden in an email by various means. It is a brand forgery email intended to harvest login credentials. But what exactly is this technique, and why do attackers use it? Read this document to learn both the why and the how of hidden text and zero font.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

Inky Technology

Exploiting a Pandemic: Coronavirus Stimulus Package Economic Impact Payments
sponsored by Inky Technology
WHITE PAPER: COVID-19 has introduced a flurry of phishing scams related to the virus, and millions of people have become victims as a result. But perhaps the most convincing of these attacks are the ones purporting to be from the US Federal Reserve offering to provide financial assistance. Read this white paper to see examples of these convincing emails.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

Inky Technology

Global Phishing Pandemic? You Be the Judge.
sponsored by Inky Technology
RESOURCE: Since the start of the COVID-19 health crisis, complaints to the FBI’s Internet Crime Complaint Center (IC3) have more than tripled. Why are there so many of these coronavirus-related email phishing threats and where are they coming from? View this article to get a link to a free report of COVID-19 phishing examples around the world.
Posted: 05 Oct 2020 | Published: 05 Oct 2020

Inky Technology

Dually Deceptive: Two New Phishing Scams Swimming by Your SEG
sponsored by Inky Technology
RESOURCE: Phishing scams have been more than pervasive in 2020, with the APWG counting 139,685 unique phishing threats in Q1 alone. As these attacks are quickly becoming more sophisticated, targeted and illusive, it’s a good idea to understand their complexity as they evolve. Jump into this short article to learn about two of these new scams.
Posted: 05 Oct 2020 | Published: 05 Oct 2020

Inky Technology

CEO Impersonation
sponsored by Inky Technology
WHITE PAPER: Threat actors have realized that they can achieve at least a minimal rate of success by impersonating a company’s CEO or other high-level official in an email to an employee lower down in the organization. They will typically request money via wire transfer, but it does not stop there. Read this white paper to see some examples.
Posted: 02 Oct 2020 | Published: 02 Oct 2020

Inky Technology

Zoom & Doom: How INKY Unraveled a Credential Harvesting Phishing Scam
sponsored by Inky Technology
RESOURCE: Zoom jumped from 10 million daily meeting participants in December 2019 to 300 million this past April. This boom in Zoom use spawned a flurry of fake meeting invitations from cybercriminals attempting to harvest credentials from users. Luckily, INKY was on the case. Read this article to view these fake Zoom meeting invites and more.
Posted: 02 Oct 2020 | Published: 02 Oct 2020

Inky Technology

Is Your Company’s Online Security Strategy Enough?
sponsored by Inky Technology
RESOURCE: Cyberattacks are costly - $10.2 billion in the U.S. alone to be exact. It’s proven that businesses are underprepared for cyberattacks, and what’s more is that every person at an organization who has an email account is vulnerable to threats. Read this article on how you can improve email security and get access to a free demo download.
Posted: 29 Sep 2020 | Published: 29 Sep 2020

Inky Technology

Exploiting a Pandemic: White House COVID-19 Phishing Scams
sponsored by Inky Technology
EBOOK: It is important to understand that we are living in a time of extreme vulnerability, and this is no less apparent than to those who are working in security. Increased internet use has led to an increase in phishing scams of all kinds. View this e-book to understand what it looks like when a phisher imitates the White House and the President.
Posted: 29 Sep 2020 | Published: 29 Sep 2020

Inky Technology
1 - 25 of 85 Matches Previous Page    1 2 3 4    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info