IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  

Spear Phishing

RSS Feed   
Spear Phishing Reports
 
The Ultimate Balancing Act: Enabling Emerging Technologies. Ensuring Security
sponsored by Frontier Communications
RESOURCE: In order to defend against today’s fast-evolving threats, cybersecurity experts are recommending a multi-layered approach to network security that doesn’t prevent innovation. Read on to learn more about achieving this balancing act.
Posted: 16 Sep 2020 | Published: 16 Sep 2020

Frontier Communications

Is Your Company’s Online Security Strategy Enough?
sponsored by Inky Technology
RESOURCE: Cyberattacks are costly - $10.2 billion in the U.S. alone to be exact. It’s proven that businesses are underprepared for cyberattacks, and what’s more is that every person at an organization who has an email account is vulnerable to threats. Read this article on how you can improve email security and get access to a free demo download.
Posted: 29 Sep 2020 | Published: 29 Sep 2020

Inky Technology

Computer Weekly – 13 June 2017: Tips for buying hyper-converged systems
sponsored by ComputerWeekly.com
EZINE: In this week's Computer Weekly, we examine the growing market for hyper-converged infrastructure, and assess the options available. We ask mature users of the cloud what's next for their migration to off-premise systems. And we analyse how retail supply chains are developing to keep up with online and mobile shopping trends.
Posted: 12 Jun 2017 | Published: 13 Jun 2017

ComputerWeekly.com

Cybereason Video 2 – Live Attack Simulation
sponsored by Cybereason
WEBCAST: Today’s attackers can carry out a persistent, stealthy network compromise. How does this happen, and what can you do to stop it? Access this webinar to get an interactive look at how today’s multi-stage attack campaigns operate and why a behavioral approach to detection is essential to stopping SUNBURST and broader malicious operations.
Posted: 26 Feb 2021 | Premiered: Feb 26, 2021

Cybereason

Data Security Predictions 2021
sponsored by Splunk
WHITE PAPER: The pandemic of 2020 created unprecedented challenges for IT security teams and initiatives. This 23-page report provides a closer look at how the Coronavirus has shaped cybersecurity and explores key data security predictions for 2021. Read on to get started.
Posted: 07 Dec 2020 | Published: 07 Dec 2020

Splunk

Email Security vs. Email Privacy: What You Need to Know
sponsored by Inky Technology
RESOURCE: Since it was first introduced, email has blown up into a business-critical communication tool. However, its popularity has led to an innumerable amount of cyberattacks over the years. In this blog post, explore the differences between email security and email privacy – and discover how to achieve both.
Posted: 30 Sep 2020 | Published: 30 Sep 2020

Inky Technology

Hacker Personas A Deeper Look Into Cybercrime
sponsored by Webroot
RESOURCE: Humans are the weakest link and organizations must protect against social engineering attacks. Learn how to boost stay protected with security awareness training.
Posted: 22 Mar 2021 | Published: 22 Mar 2021

TOPICS:  Phishing
Webroot

"Hacking as a Service," and Other Emerging Threats
sponsored by SearchSecurity.com
EZINE: Lethal threats to enterprise security are emerging from every which way. Access this exclusive edition of Information Security Magazine to learn just what you're up against.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

SearchSecurity.com

Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
sponsored by Core Security Technologies
WHITE PAPER: This white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
Posted: 11 Oct 2013 | Published: 11 Oct 2013

Core Security Technologies

5 Ways to Prevent a Ransomware Infection through Network Security
sponsored by IBM
EGUIDE: Even though ransomware attacks are becoming more creative, getting back to the basics of network security could be the key to preventing future infections. In this e-guide, we explore 5 key steps for preventing ransomware attacks.
Posted: 05 Oct 2016 | Published: 03 Oct 2016

IBM
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info  | Cookie Preferences