IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  

Spear Phishing

RSS Feed   
Spear Phishing Reports
 
How to Prepare for and Protect Against Ransomware
sponsored by Spin Tech
EGUIDE: In future pandemics and similar events, the need for proactive cybersecurity management will be an essential business requirement. Access this e-guide for steps on how to prepare for and protect against ransomware at your enterprise.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Spin Tech

Chart Industries Vaporizes Ransomware and Malware
sponsored by Malwarebytes
CASE STUDY: In this case study, follow the journey of Chart Industries, a global manufacturer and distributer, as they partner with Malwarebytes to address the growing risk of malware and phishing attacks targeted at mobile workers and endpoints. Download the report to see the results.
Posted: 13 Feb 2020 | Published: 13 Feb 2020

Malwarebytes

Stop Targeted Attacks and Data Loss on G Suite
sponsored by Armorblox
PRODUCT OVERVIEW: Today’s cloud-delivered email inboxes require deliberate security measures that go above and beyond traditional on-prem email security practices and tools. Download this solution brief to learn more about Armorblox for G Suite, designed to prevent targeted cyberattacks and data loss on cloud-delivered email platforms.
Posted: 29 Jun 2020 | Published: 29 Jun 2020

Armorblox

Corralling Email-Based Threats To Keep Them Out Of Users' Mailboxes
sponsored by Proofpoint
CASE STUDY: When Agri-Marché started seeing more and more email threats in employees' inboxes, the food company needed an email security platform that would secure 5 email domains and protect 300 inboxes. In this case study, learn how Agri-Marché was able to do this by deploying Proofpoint Email Protection and Proofpoint Target Attack Protection.
Posted: 06 Jun 2019 | Published: 06 Jun 2019

Proofpoint

Cybercrime Tactics and Techniques: Ransomware Retrospective
sponsored by Malwarebytes
WHITE PAPER: In this edition of Cybercrime Tactics and Techniques, take an in-depth look into ransomware attacks over the past few years – attack methods, common targets and notable subcategories. In addition, this report will consider where ransomware will go next, and how to prepare. Read on to reveal the full report.
Posted: 21 Jan 2020 | Published: 31 Aug 2019

Malwarebytes

Spear Phishing: Top Threats and Trends
sponsored by Barracuda
WHITE PAPER: Business email compromise (BEC) is an emerging cybersecurity threat that targets user inboxes. While BEC makes up just 7% of spear-phishing attacks, it’s responsible for over $26 billion in losses in the last four years. In this report, explore the latest BEC tactics used by scammers and best practices for protecting your organization.
Posted: 18 May 2020 | Published: 30 Nov 2019

Barracuda

Six-Step Guide to Email Security Best Practices
sponsored by Clearswift
WHITE PAPER: The growing reliance on email presents an increasingly lucrative attack vector for cybercriminals. In order to combat this rising threat, organizations need to ensure their email security hygiene is viable. To help you get started, download this white paper from Clearswift, which provides a 6-step guide to email security best practices.
Posted: 09 Jul 2020 | Published: 09 Jul 2020

Clearswift

The Seven Essentials of a Modern Email Security Platform
sponsored by Ironscales
WHITE PAPER: Businesses of all sizes face the risk of data loss from email phishing campaigns, and existing security solutions can’t keep pace with evolving attack methods. In this playbook, uncover the 7 essentials needed to enable email security, and discover why employees are the top method of threat detection.
Posted: 10 Jan 2020 | Published: 10 Jan 2020

Ironscales

Successfully Scaling Cybersecurity for Remote Work: Protect Your People
sponsored by Forcepoint
RESOURCE: One of the key directives for today’s IT and security teams is to safeguard the users and data within their distributed environment and implement cyber defenses that can protect those users—regardless of their location or device. Read on to learn how to keep your remote workers secure against today’s internal and external threats.
Posted: 03 Jun 2020 | Published: 03 Jun 2020

Forcepoint

"Hacking as a Service," and Other Emerging Threats
sponsored by SearchSecurity.com
EZINE: Lethal threats to enterprise security are emerging from every which way. Access this exclusive edition of Information Security Magazine to learn just what you're up against.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

SearchSecurity.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info