IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  

Spear Phishing

RSS Feed   
Spear Phishing Reports
 
The state of email trust in 2014
sponsored by ComputerWeekly.com
RESEARCH CONTENT: Email security improved in 2014 but most companies still haven't done enough to protect their customers from phishing attacks, this study from Agari reveals.
Posted: 26 Feb 2015 | Published: 26 Feb 2015

ComputerWeekly.com

Types of DNS Attacks Reveal DNS Defense Tactics
sponsored by SearchSecurity.com
EGUIDE: This E-Guide from SearchSecurity.com details different types of common domain name system (DNS) attacks, the unusual behaviors they invoke, and which defense tactics work best in the given scenario. View now to learn more!
Posted: 21 Mar 2013 | Published: 21 Mar 2013

SearchSecurity.com

Enterprise Email Security, Q2 2019: The 12 Providers That Matter Most And How They Stack Up
sponsored by Proofpoint
ANALYST REPORT: Email is a critical business function deeply embedded in business processes. Its ubiquity makes email a platform for credential phishing attempts, malware, spam, and business email compromise. This research report suggests 3 key considerations to look for when choosing an email content security provider.
Posted: 19 Aug 2019 | Published: 16 May 2019

Proofpoint

Dutch DIY Giant Shelves Email Attacks
sponsored by Barracuda
CASE STUDY: As email impersonation attacks and CEO fraud pick up momentum worldwide, Intergamma IT Manager Ruud Bronswijk knew there was an urgent need to improve the DIY company’s defenses. To discover how Intergamma ultimately bolstered their Office 365 security to thwart a variety of email-based attacks, download the case study here.
Posted: 14 Oct 2019 | Published: 14 Oct 2019

Barracuda

Automating Phishing Investigations at the No. 1 Managed Cloud Company
sponsored by Splunk
CASE STUDY: Rackspace implemented Splunk Phantom to investigate phishing emails. Using Phantom's Apps and Playbooks, Rackspace is able to quickly execute actions, ensuring a repeatable and auditable process for remediating phish. In this case study, explore the benefits that Rackspace has seen since deploying Phantom.
Posted: 21 Mar 2019 | Published: 21 Mar 2019

Splunk

Sharing knowledge to tackle online banking fraud
sponsored by ComputerWeekly.com
ESSENTIAL GUIDE: This article in our Royal Holloway Security Series argues that an information sharing service between national banking systems and law enforcement agencies could counteract online fraud.
Posted: 22 Jul 2014 | Published: 22 Jul 2014

ComputerWeekly.com

Corralling Email-Based Threats To Keep Them Out Of Users' Mailboxes
sponsored by Proofpoint
CASE STUDY: When Agri-Marché started seeing more and more email threats in employees' inboxes, the food company needed an email security platform that would secure 5 email domains and protect 300 inboxes. In this case study, learn how Agri-Marché was able to do this by deploying Proofpoint Email Protection and Proofpoint Target Attack Protection.
Posted: 06 Jun 2019 | Published: 06 Jun 2019

Proofpoint

E-Guide: New Malware Threats Require New Antimalware Protection Strategy
sponsored by SearchSecurity.com
EGUIDE: This expert e-guide examines emerging threats and malware that are targeting smartphones, mobile apps, social media, and cloud services. Inside, discover essential strategies and best practices for mitigating these risks and ensuring enterprise security.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

SearchSecurity.com

Improving Enterprise Email Security: Systems and Tips
sponsored by Agari
EGUIDE: This expert e-guide details systems that can help improve your email security and tips on how to keep it secure.
Posted: 04 Oct 2013 | Published: 04 Oct 2013

Agari

Presentation Transcript: How Google Tackles IT Security and What You Can Learn from It
sponsored by Google Apps
PRESENTATION TRANSCRIPT: Today's computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to incidents.
Posted: 19 Jan 2011 | Published: 19 Jan 2011

Google Apps
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement