IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  

Social Engineering

RSS Feed   
DEFINITION: Pretexting is a form of social engineering in which an individual lies about his identity or purpose to obtain privileged data about another individual. A pretexter may then use this data to engage in identity theft or corporate espionage. Pretexting may be employed by telephone or email, through customer service instant messaging or a company Web site. A pretexter may use a variety of strategies  … 

Social Engineering definition sponsored by SearchCIO.com, powered by WhatIs.com an online computer dictionary
Social Engineering Reports
 
Network Security and Newly Observed Domains (NOD)
sponsored by Farsight Security
RESOURCE: Bad actors use new domains for criminal activities such as spam, malware distribution or botnets within the first minutes of creating them. Learn about a Newly Observed Domains platform that's designed to help you get real-time insight into newly created domains, anticipate threats, and defend against them.
Posted: 24 May 2018 | Published: 31 Dec 2017

Farsight Security

Case Study: How a Pharmaceutical Leader Boosted Security & Efficiency Through Cloud Security
sponsored by Cisco Umbrella
CASE STUDY: Explore this case study to gain insight into how Lundbeck, a global pharmaceutical leader, boosted security and efficiency through a cloud security approach.
Posted: 07 Feb 2018 | Published: 07 Feb 2018

Cisco Umbrella

Playbook Fridays: Forcing Active Directory (AD) Password Resets via ThreatConnect Victims
sponsored by ThreatConnect
RESOURCE: This blog post highlights an intelligence driven orchestration platform that automates almost any cybersecurity task, runs in real time, and provides you with detail information about each run. Find out how this platform can integrate with your active directory service to detect attacks and prevent damaging breaches.
Posted: 11 Oct 2018 | Published: 08 May 2018

ThreatConnect

Cybercrime and warfare: All that matters
sponsored by ComputerWeekly.com
BOOK: Peter Warren and Michael Streeter assessĀ  the history, scale and importance of cyber crime this chapter from their book, Cybercrime and warfare: All That Matters.
Posted: 04 Dec 2013 | Published: 04 Dec 2013

ComputerWeekly.com

Ransomware Defense for Healthcare in 45 Seconds
sponsored by Cisco Umbrella
VIDEO: Hacking is big business, and healthcare is the number one targeted industry. Find out how advanced malware protection can keep patient data, research and your network safe.
Posted: 10 Jul 2018 | Premiered: 10 Jul 2018

Cisco Umbrella

Beyond Spam - Email Security in the Age of Blended Threats
sponsored by EdgeWave
WHITE PAPER: In this paper, explore the new threat reality, including the tactics and designs cyber criminals are using today and uncover some of the next generation technologies that can help mitigate these threats.
Posted: 12 Mar 2012 | Published: 12 Mar 2012

EdgeWave

Symantec Internet Security Threat Report: Trends for 2011
sponsored by Symantec Corporation
WHITE PAPER: This threat report takes a thorough look back at the most significant threats, trends and outright attacks of the year that was. Read now for helpful tips and best practices for keeping your confidential information safe.
Posted: 25 May 2012 | Published: 30 Apr 2012

Symantec Corporation

The Custom Defense - Your Answer to APTs
sponsored by Trend Micro
VIDEO: Explore an innovative new technology available to help your organization combat potentially disastrous advanced persistent threats (APTs).
Posted: 17 Apr 2013 | Premiered: 17 Apr 2013

Trend Micro

Four Myths About Credential Phishing You Can't Ignore
sponsored by Okta
WHITE PAPER: Successful phishing prevention starts with placing identity at the center of your security strategy. In this white paper, find out why phishing can be more dangerous to organizations than a malware attack, common misconceptions, and 4 myths about credential phishing you can't ignore.
Posted: 29 Aug 2018 | Published: 29 Aug 2018

Okta

Keeping Networks safe from Social Networking
sponsored by BlueCoat
EGUIDE: Social Networking has provided attackers with an innovative way to gain information from within your corporate networks. This expert E-Guide will provide you with the information needed to keep your organization safe from the threats of social networking.
Posted: 21 Nov 2011 | Published: 21 Nov 2011

BlueCoat
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement