IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  

Spear Phishing

RSS Feed   
Spear Phishing Reports
 
Office365 is Not Built to Defend Against Modern Real-World Email Threats
sponsored by Ironscales
WHITE PAPER: Email phishing attack detection and response is one of the biggest challenges security teams face today, representing 93% of breaches. In this white paper, compare Office 365’s Advanced Threat Protection to IRONSCALES Advanced Email Threat Protection and see how they stack up against today’s email threats.
Posted: 15 Jan 2020 | Published: 15 Jan 2020

Ironscales

E-Guide: New Malware Threats Require New Antimalware Protection Strategy
sponsored by SearchSecurity.com
EGUIDE: This expert e-guide examines emerging threats and malware that are targeting smartphones, mobile apps, social media, and cloud services. Inside, discover essential strategies and best practices for mitigating these risks and ensuring enterprise security.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

SearchSecurity.com

Protecting the Institution: IRONSCALES & Dalton State Success Story
sponsored by Ironscales
VIDEO: In the wake of an email phishing attack in 2017, Dalton State College set out to implement an email security platform that would better equip them to handle future attacks. This success story recaps how Dalton State’s partnered with IRONSCALES to protect their email user from phishing threats.
Posted: 20 Jan 2020 | Premiered: 02 Dec 2019

Ironscales

The Seven Essentials of a Modern Email Security Platform
sponsored by Ironscales
WHITE PAPER: Businesses of all sizes face the risk of data loss from email phishing campaigns, and existing security solutions can’t keep pace with evolving attack methods. In this playbook, uncover the 7 essentials needed to enable email security, and discover why employees are the top method of threat detection.
Posted: 10 Jan 2020 | Published: 10 Jan 2020

Ironscales

How to Survive a Bank Robbery
sponsored by Splunk
WHITE PAPER: Today's organizations are plagued by a myriad of cyberthreats designed to target their sensitive data and disrupt their business operations. Is your organization prepared in the event of a cyberattack? This guide is designed to prepare you to survive the 10 most common threats. Read on to learn more.
Posted: 05 Mar 2020 | Published: 05 Mar 2020

Splunk

The ROI of Security Awareness Training
sponsored by Mimecast
WHITE PAPER: When it comes to developing a security strategy to protect your organization’s sensitive data, it’s critical to consider both the people within your environment as well as the technology. In this white paper, review the results of in-depth research recently conducted by Osterman Research and discover the need for security awareness programs.
Posted: 11 Dec 2019 | Published: 31 Aug 2019

Mimecast

Lookout Phishing and Content Protection
sponsored by Lookout Inc.
DATA SHEET: While many organizations have invested into firewalls, gateways and filters to stop email phishing attacks, those methods are ineffective against phishing attacks that target mobile devices. In this data sheet, explore the characteristics of a mobile phishing attack, their impact, and best practices for protecting your network.
Posted: 09 Jan 2020 | Published: 25 Oct 2018

Lookout Inc.

Tricentis Slams the Door on C-level Email Attacks Using Barracuda Sentinel
sponsored by Barracuda
VIDEO: Tune into this video to discover how Tricentis managed to thwart spear phishing and fraud attacks against senior staff by adding AI-powered Barracuda Sentinel to their security arsenal.
Posted: 08 Oct 2019 | Premiered: 31 May 2019

Barracuda

The Personalisation Challenge: Business Culture and Mobile Security
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This exclusive white paper reveals the truth about mobility in the workforce, including the risks and rewards of bring your own device (BYOD) for businesses.
Posted: 24 Sep 2013 | Published: 24 Sep 2013

Hewlett Packard Enterprise

Modernize Your Approach to Authentication
sponsored by SearchSecurity.com
EBOOK: This white paper can help you discover why attackers can target the token vendor to take advantage of the security of the authentication system as a whole and how you can replace the ubiquitous authenticator in your business.
Posted: 06 Aug 2012 | Published: 06 Aug 2012

SearchSecurity.com
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2020, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info