IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  

Spear Phishing

RSS Feed   
Spear Phishing Reports
 
Successful Phishing Attacks at a Northeastern US College Drop by 90%
sponsored by Wombat Security Technologies
CASE STUDY: According to the Verizon DBIR, 44% of breaches in the education sector involve social attacks, including email. Explore this case study to gain insight into how one public college revamped its cybersecurity approach after falling victim to a damaging email attack.
Posted: 27 Feb 2018 | Published: 27 Feb 2018

Wombat Security Technologies

Mobile Security Strategies
sponsored by ComputerWeekly.com
ANALYST REPORT: This exclusive report for Computer Weekly members explains the security risks and challenges of using mobile devices in the enterprise.
Posted: 09 Nov 2012 | Published: 09 Nov 2012

ComputerWeekly.com

Stopping Email Fraud
sponsored by Proofpoint, Inc.
WHITE PAPER: Email fraud has cost victims more than $5.3 billion between the end of 2013 and 2017, according to the FBI. Leverage this resource to learn how to protect your organization from email threats including, imposters, phishers, and other non-malware threats.
Posted: 19 Mar 2018 | Published: 19 Mar 2018

Proofpoint, Inc.

3 Components of an Effective Anti-Phishing Strategy
sponsored by Rapid7
RESOURCE: According to the 2018 Verizon Data Breach Investigations Report, phishing attacks are the number one threat to businesses today as email and social engineering are the most common methods of attack. Read on to learn how a comprehensive anti-phishing program can be built with just 3 foundational elements.
Posted: 11 Sep 2018 | Published: 11 Sep 2018

Rapid7

Spear Phishing: The #1 Threat
sponsored by Farsight Security
RESOURCE: Find out how you can combat spear phishing with a Newly Observed Domains (NOD) platform that integrates with your company's DNS to help you identify all new domains, assess potential threats, and prevent attacks from infiltrating your systems.
Posted: 22 May 2018 | Published: 31 Dec 2016

Farsight Security

Playbook Fridays: Forcing Active Directory (AD) Password Resets via ThreatConnect Victims
sponsored by ThreatConnect
RESOURCE: This blog post highlights an intelligence driven orchestration platform that automates almost any cybersecurity task, runs in real time, and provides you with detail information about each run. Find out how this platform can integrate with your active directory service to detect attacks and prevent damaging breaches.
Posted: 11 Oct 2018 | Published: 08 May 2018

ThreatConnect

Phishing and Web Security
sponsored by Webroot
WHITE PAPER: This brief whitepaper explores why businesses need to prepare for phishing 2.0 and why this new cybercrime is aiming its sights at your business.
Posted: 29 Apr 2014 | Published: 31 Dec 2013

Webroot

Your People are Your Biggest IT Security Threat
sponsored by Rackspace Microsoft
WHITE PAPER: Take a look at the top 3 human risks and learn how training and risk controls can help to mitigate these threats.
Posted: 03 Aug 2018 | Published: 03 Aug 2018

Rackspace Microsoft

Understanding the Limitations of Microsoft Office 365 Security
sponsored by Forcepoint
VIDEO: Tune into this 30-minute webcast where CEO and founder, Mike Osterman, will discuss the key findings of an Office 365 study and organizations' priorities around email security.
Posted: 18 Sep 2018 | Premiered: 06 Sep 2018

Forcepoint

IT@Intel Brief: Enterprise Security Benefits of Microsoft Windows 7
sponsored by Intel
IT BRIEFING: Read this solution brief to learn how Microsoft Windows 7 provides enterprise information security and protects against malware and phishing. This paper discusses all the key features.
Posted: 27 Sep 2010 | Published: 25 Jul 2010

Intel
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2018, TechTarget | Read our Privacy Statement