IT Management  >   Systems Operations  >   Security  >   Security Threats  >  

Email Threats

RSS Feed   
ALSO CALLED: Threats
DEFINITION: Vulnerabilities in an email message.
Email Threats Reports
1 - 25 of 61 Matches Previous Page  |  Next Page
Email Risk Assessment Report
sponsored by 365iTMS
ANALYST REPORT: Email security is much talked about right now, and it’s important that you’re up to date on the scale at which it’s under attack, the most popular types of malware bad actors are using and the vulnerability of email in general. Access the Email Risk Assessment Report to understand these trends and to pick up 7 recommendations on email safety.
Posted: 12 Feb 2021 | Published: 12 Feb 2021

365iTMS

Omdia Market Radar: Outbound Email Security
sponsored by Zivver
WHITE PAPER: When it comes to email security, organizations put their primary focus on potential threats coming in. And that’s fine, but outbound email security is arguably just as important. Browse this white paper to get a closer look at outbound email data protection, which focuses on building controls to offset risks from the insider threat.
Posted: 09 Dec 2020 | Published: 09 Dec 2020

Zivver

Top 10 Capabilities that Organizations Need in a Secure Email Gateway: A buyer’s guide
sponsored by Mimecast
EBOOK: With the proliferation of advanced threat techniques in today’s ecosystem, organizations are adopting secure email gateways (SEGs) for a multi-layered approach against email-borne threats. How can you be sure you’re considering the right one? This buyer’s guide details the 10 most important capabilities organizations should seek in a SEG solution.
Posted: 08 Dec 2020 | Published: 08 Dec 2020

Mimecast

Eliminate the Threat of Exfiltrative, Extortive Ransomware
sponsored by Atakama
RESOURCE: Maze ransomware involves developers and ‘affiliates’ leveraging ransomware-as-a-services technology to actually scale ransomware attacks. It first appeared in May 2019, and with ransomware damage costs projected to reach $20 billion by 2021, the time to invest in ransomware defense is now. Browse this article to see how Atakama can help.
Posted: 07 Dec 2020 | Published: 08 Jul 2020

Atakama

Phishing: Not Just One Kind of Attack
sponsored by Atakama
RESOURCE: Phishing attacks utilize a wide range of ever-evolving techniques to steal data, from impersonating executives to targeting and duping unsuspecting employees. How can you better understand these scams? This article breaks down common schemes, their targets and their indicators, and gives a solution from Atakama for keeping these threats at bay.
Posted: 07 Dec 2020 | Published: 19 Aug 2020

Atakama

Taking the Mystery Out of Protecting Your Office 365 Data
sponsored by arcserve
RESOURCE: Microsoft Office 365 lets you work anywhere, anytime with on-premises and cloud SaaS, IaaS and PaaS-based solutions. But while Microsoft takes care of the infrastructure for these services, it’s up to you to take care of your data. Scope out this infographic to learn how you could achieve cloud-to-cloud protection for Office 365.
Posted: 04 Dec 2020 | Published: 04 Dec 2020

arcserve

Ransomware State of Play
sponsored by Cylance
WEBCAST: Ransomware is evolving – campaigns are shifting from widespread to highly-targeted, often deployed via compromised MSSP. Additionally, Ransomware-as-a-Service (RaaS) is becoming more private, and threat actors are teaming up to extend their tooling. How can you stay secure? Watch this webcast to learn more about the state of play in ransomware.
Posted: 02 Nov 2020 | Premiered: Nov 2, 2020

Cylance

Cloud Email Needs Cloud Security
sponsored by Cisco
RESOURCE: 90% of breaches occur via email, and in today’s cloud-centric world, built-in email security may not be enough. In order to secure Microsoft 365 from threats inside and outside of your mailbox, businesses need to consider email security that’s built for the cloud. View this infographic to learn more and to discover another security opportunity.
Posted: 07 Oct 2020 | Published: 07 Oct 2020

Cisco

Ransomware Decoded
sponsored by Cybereason
WHITE PAPER: Ransomware has reemerged, and ransom payments have shot up in tandem, with the average payout at $80,000 in Dec. 2019. In addition, it’s evolving to avoid detection, and with the advent of Ransonware-as-a-Service (RaaS), even non-technical users can create an attack. Stay vigilant, read this white paper to learn what modern ransomware looks like.
Posted: 11 Sep 2020 | Published: 11 Sep 2020

Cybereason

Danger within: email and security awareness training strategies for effective account takeover protection
sponsored by Mimecast
WHITE PAPER: It’s a common misconception that email-borne attacks come only from outside the organization. Can your employees discern an impersonation email or email attack using a legitimate internal account? How good is your security posture? Take a look at this whitepaper how you can create more effective email security as well as a more vigilant workforce.
Posted: 24 Aug 2020 | Published: 24 Aug 2020

Mimecast

Webinar - Defend better and respond faster with security that works together
sponsored by Cisco Umbrella
WEBCAST: Most malware infections happen in one of only 3 ways, so why aren’t they easier to stop? As organizations embrace the cloud, it’s now imperative to find a new approach to securing users and devices. View this webinar to find out how to stop attacks before they start and how to safeguard your organization with a layered approach to cybersecurity.
Posted: 31 Jul 2020 | Premiered: Jul 14, 2020

Cisco Umbrella

2020 User Risk Report
sponsored by Proofpoint
WHITE PAPER: Access this white paper to discover user cybersecurity awareness and knowledge gaps while discovering specific actions you can take to empower your people and build up your cyber resilience.
Posted: 25 Jun 2020 | Published: 24 Jun 2020

Proofpoint

Email Security: Never more important
sponsored by ComputerWeekly.com
EBOOK: In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

ComputerWeekly.com

Spear Phishing vol2: Top Threats and Trends. Email account takeover, Defending against lateral phishing
sponsored by Barracuda
WHITE PAPER: This report takes an in-depth look at lateral phishing tactics. Read on to gain exclusive insight into recipient targeting strategies, the 10 most common words used in lateral phishing emails, 3 ways to defend against lateral phishing, and more.
Posted: 11 Oct 2019 | Published: 11 Oct 2019

Barracuda

Who will win the world's biggest cloud contract?
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: In this week's Computer Weekly, we examine the $10bn Pentagon cloud contract – codenamed JEDI – and ask why it is taking so long to choose a supplier. We discuss with IT chiefs how AI will transform technology leadership. And we look at how to improve your email security. Read the issue now.
Posted: 20 Aug 2019 | Published: 20 Aug 2019

ComputerWeekly.com

Email security: Never more important
sponsored by ComputerWeekly.com
EGUIDE: In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
Posted: 30 Jul 2019 | Published: 30 Jul 2019

ComputerWeekly.com

Computer Weekly – 24 October 2017: Where will AI take us?
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, artificial intelligence (AI) enthusiasts and sceptics debate the opportunities and risks of the much-hyped technology. Our latest buyer's guide examines the benefits of cloud-native applications. And we look at best practice in defending email systems from cyber attacks. Read the issue now.
Posted: 20 Oct 2017 | Published: 24 Oct 2017

ComputerWeekly.com

The state of email trust in 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Email security improved in 2014 but most companies still haven't done enough to protect their customers from phishing attacks, this study from Agari reveals.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

ComputerWeekly.com

Advanced cybersecurity fraud and how to fight it
sponsored by SearchSecurity.com
EBOOK: Fraud is as ancient as time, but cybersecurity fraud is hitting heights of sophistication the ancient Greeks never imagined. Learn the latest cyberfraud scams and how to thwart them with a combination of processes, tools and education.
Posted: 02 Mar 2021 | Published: 02 Mar 2021

SearchSecurity.com

What secure email gateways can do for your enterprise
sponsored by SearchSecurity.com
EBOOK: It is important to evaluate secure email gateways before implementing them in your organization. Here's a look at some of the best email security gateway products in the industry, as well as implementation, cost and uses.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

SearchSecurity.com

Create an Effective Email Phishing Test in 7 Steps
sponsored by Cisco Umbrella
EGUIDE: The best way for IT to improve email phishing security is through comprehensive testing, which helps identity which users are susceptible and what type of fake email is more effective. Dive into this e-guide to learn how to create an effective email phishing test in 7 steps.
Posted: 22 Nov 2019 | Published: 21 May 2018

Cisco Umbrella

The Best Email Security Comes Through Strategy and Tactics
sponsored by SearchSecurity.com
EBOOK: Achieving the best email security possible should be a top InfoSec priority. Why? Attackers work day and night thinking up new ways to bypass IT security. In this security handbook, learn how to approach email security both strategically and tactically.
Posted: 29 Mar 2019 | Published: 29 Mar 2019

SearchSecurity.com

Crunching the Costs of Microsoft Exchange On-premises vs. Cloud Services
sponsored by Riverbed Technology, Inc.
EGUIDE: Download this expert guide to learn how to calculate the costs of on-premises Exchange versus those of Office 365's mail service, and from this assessment deduce if the O365 cloud is your enterprise's best option for collaboration. Discover new cost factors such as electricity, bandwidth needs, personnel expenses, and more.
Posted: 28 Nov 2016 | Published: 22 Nov 2016

Riverbed Technology, Inc.

How Global Threat Intelligence Fits into a Security Strategy
sponsored by IBM
EGUIDE: Before considering global threat intelligence services, there are some critical dangers that you may need to address closer to home. In this e-guide, Rob Shapland shares his advice on how simple tools like staff training and awareness can help prevent breaches from phishing attacks and more.
Posted: 05 Oct 2016 | Published: 03 Oct 2016

IBM

Squash Large Business Email Security Challenges
sponsored by Intermedia Net
EGUIDE: If you're a large enterprise, your security needs are unique. So don't take advice from a small organization, and learn how to accommodate the challenges specific to your size. This exclusive e-guide explores some Exchange security challenges and considerations that large enterprises face on a daily basis.
Posted: 15 Sep 2016 | Published: 13 Sep 2016

Intermedia Net
1 - 25 of 61 Matches Previous Page    1 2 3    Next Page

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences