IT Management  >   Systems Operations  >   Security  >   Security Threats  >   Email Threats  >  

e-Mail Spoofing

RSS Feed   
e-Mail Spoofing Reports
 
Maturing Your DLP Strategy for Today’s Threats
sponsored by SearchSecurity.com
EGUIDE: Social networks have become a new avenue to cybercriminals today, using social engineering to exploit systems and data. In this expert resource, uncover how social networking is impacting data loss prevention (DLP) strategies and explore eight key questions to ask your vendor to help mature your DLP solution.
Posted: 02 Feb 2012 | Published: 02 Feb 2012

SearchSecurity.com

GreyEnergy: Dissecting the Malware from Maldoc to Backdoor
sponsored by Nozomi Networks
WHITE PAPER: GreyEnergy uses a common infection method, phishing emails with infected documents. However, the malware's code is anything but common – it is well written, smartly put together and designed to defeat detection by cybersecurity products. In this white paper, dive into an analysis of how the malware works.
Posted: 26 Sep 2019 | Published: 28 Feb 2019

Nozomi Networks

Whitepaper: Does Office 365 Deliver the Email Security and Resilience Enterprises Need?
sponsored by Mimecast
WHITE PAPER: In this white paper, learn about the native security features Office 365 delivers, as well as how to extend them for the added resilience you need to keep your communications safe.
Posted: 26 Aug 2019 | Published: 12 Jun 2019

Mimecast

Cisco Ransomware Defense: Keep Ransomware at Bay
sponsored by Cisco Umbrella
WHITE PAPER: Files and information are the lifeblood of an organization. Keeping this information secure is nonnegotiable. Without the appropriate defenses, ransomware can inflict enough damage to reduce an organization to operating with pen and paper. In this white paper, learn the benefits of Cisco Ransomware Defense.
Posted: 19 Feb 2019 | Published: 31 Oct 2017

Cisco Umbrella

E-Guide: New Malware Threats Require New Antimalware Protection Strategy
sponsored by SearchSecurity.com
EGUIDE: This expert e-guide examines emerging threats and malware that are targeting smartphones, mobile apps, social media, and cloud services. Inside, discover essential strategies and best practices for mitigating these risks and ensuring enterprise security.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

SearchSecurity.com

Security Orchestration and Automation Playbook
sponsored by Rapid7
WHITE PAPER: Discover how security orchestration and automation helps teams improve their security posture and create efficiency – without sacrificing control of important security and IT processes.
Posted: 26 Jun 2019 | Published: 26 Jun 2019

Rapid7

Reduce Phishing Risk in Minutes with Umbrella and Duo
sponsored by Cisco Umbrella
WEBCAST: Cloud applications provide scale and cost benefits over legacy on-premises solutions. But with more users going direct-to-internet, the risk increases when users bypass security controls. In this webcast, learn how Umbrella and Duo can help you reduce this risk across all of your cloud and on-premises apps with a zero-trust strategy.
Posted: 06 Sep 2019 | Premiered: Sep 6, 2019

Cisco Umbrella

Proofpoint Email Isolation
sponsored by Proofpoint
PRODUCT OVERVIEW: It's an ongoing struggle to protect your employees against targeted phishing attacks and credential theft. To make matters worse, attackers are quickly getting the upper hand by using malicious URLs for large-scale campaigns. In this brief, learn how Proofpoint Email Isolation can help you isolate your employees from advanced threats.
Posted: 23 Aug 2019 | Published: 23 Aug 2019

Proofpoint

An Overview of Barracuda PhishLine
sponsored by Barracuda
VIDEO: The following video will help you prepare for a range of threats with patented, highly-variable attack simulations for multiple vectors—including phishing, smishing, vishing, and found physical media. View it now to learn how to put them to use in your organization.
Posted: 28 May 2019 | Premiered: 08 Feb 2019

Barracuda

Symantec Internet Security Threat Report
sponsored by Symantec Corporation
WHITE PAPER: This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!
Posted: 23 Jul 2013 | Published: 30 Apr 2013

Symantec Corporation
 

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific websites, magazines and events.

Definitions:

All Rights Reserved, Copyright 2000 - 2019, TechTarget | Read our Privacy Statement