IT Management  >   Systems Operations  >   Security  >   Messaging Security  >  

E Mail Security

RSS Feed   
E Mail Security Reports
 
Improve Threat Resolution Cycles by Leveraging DNS
sponsored by Infoblox
RESOURCE: Some companies may not be utilizing an effective threat detection tool that’s more common than you think: DNS. According to Forrester research, 66% of security and risk leaders said DNS catches threats their other security tools can’t. View the full Forrester infographic to see more statistics behind the effectiveness of DNS for security.
Posted: 18 Feb 2021 | Published: 18 Feb 2021

Infoblox

9 Reasons Why Security Leaders Need to Re-Evaluate Email Security
sponsored by Zivver
WHITE PAPER: Access this white paper for the why, what and how of the 9 challenges organizations face to adequately protect data while still using ‘normal email’.
Posted: 19 Nov 2020 | Published: 19 Nov 2020

Zivver

Exploiting a Pandemic Coronaphish COVID-19 Phishing Scams
sponsored by Inky Technology
WHITE PAPER: Phishing scams are constantly evolving, seeking out more effective ways to bypass security measures and trick recipients. In this edition of Understanding Phishing, explore how the COVID-19 pandemic has changed phishing campaigns by dissecting a few real-world examples.
Posted: 01 Oct 2020 | Published: 01 Oct 2020

Inky Technology

Ransomware State of Play
sponsored by Cylance
WEBCAST: Ransomware is evolving – campaigns are shifting from widespread to highly-targeted, often deployed via compromised MSSP. Additionally, Ransomware-as-a-Service (RaaS) is becoming more private, and threat actors are teaming up to extend their tooling. How can you stay secure? Watch this webcast to learn more about the state of play in ransomware.
Posted: 02 Nov 2020 | Premiered: Nov 2, 2020

Cylance

Exploiting a Pandemic: White House COVID-19 Phishing Scams
sponsored by Inky Technology
EBOOK: It is important to understand that we are living in a time of extreme vulnerability, and this is no less apparent than to those who are working in security. Increased internet use has led to an increase in phishing scams of all kinds. View this e-book to understand what it looks like when a phisher imitates the White House and the President.
Posted: 29 Sep 2020 | Published: 29 Sep 2020

Inky Technology

The Best Email Security Comes Through Strategy and Tactics
sponsored by SearchSecurity.com
EBOOK: Achieving the best email security possible should be a top InfoSec priority. Why? Attackers work day and night thinking up new ways to bypass IT security. In this security handbook, learn how to approach email security both strategically and tactically.
Posted: 29 Mar 2019 | Published: 29 Mar 2019

SearchSecurity.com

Could the WannaCry Decryptor Work on Other Ransomware Strains?
sponsored by Cisco Umbrella
EGUIDE: After the global outbreak of the WannaCry ransomware, researchers created decryptor tools that could save affected files. In this guide, expert Matthew Pascucci explains how the tools work and if they work on other ransomware strains.
Posted: 01 Sep 2017 | Published: 29 Aug 2017

Cisco Umbrella

"Hacking as a Service," and Other Emerging Threats
sponsored by SearchSecurity.com
EZINE: Lethal threats to enterprise security are emerging from every which way. Access this exclusive edition of Information Security Magazine to learn just what you're up against.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

SearchSecurity.com

Ransomware Attacks: How to Get the Upper Hand
sponsored by Cisco Umbrella
EGUIDE: The rock group Radiohead is celebrated for its unconventional approach to recording and releasing music. Lately, the band is also turning heads for how it handled a hacker trying to sell its unreleased work. In this e-guide learn what security experts think of Radiohead’s strategy for dealing with the ransomware threat.
Posted: 26 Nov 2019 | Published: 21 Nov 2019

Cisco Umbrella

Squash Large Business Email Security Challenges
sponsored by Intermedia Net
EGUIDE: If you're a large enterprise, your security needs are unique. So don't take advice from a small organization, and learn how to accommodate the challenges specific to your size. This exclusive e-guide explores some Exchange security challenges and considerations that large enterprises face on a daily basis.
Posted: 15 Sep 2016 | Published: 13 Sep 2016

Intermedia Net
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2021, TechTarget | Read our Privacy Statement  | Do Not Sell My Personal Info