ComputerWeekly.com Research Library

Powered by Bitpipe.com

Email Security Services Research

  • Using Secure Email Gateway to enhance data security in Microsoft Office 365

    Sponsored by: Clearswift

    This solution brief examines the common areas of concern when it comes to securing Office 365 and explores how Clearswift’s SEG may be able to help organizations address these concern areas and ensure protection and visibility across their platform.

  • Six-Step Guide to Email Security Best Practices

    Sponsored by: Clearswift

    The growing reliance on email presents an increasingly lucrative attack vector for cybercriminals. In order to combat this rising threat, organizations need to ensure their email security hygiene is viable. To help you get started, download this white paper from Clearswift, which provides a 6-step guide to email security best practices.

  • 2019 Proofpoint Domain Fraud Report

    Sponsored by: Proofpoint

    Domain fraud is a growing threat vector in which the threat actor impersonates a trusted brand to launch phishing attacks and other disruptive campaigns. Download this research report to learn more about the latest domain fraud trends – including how the domains are created, common characteristics and more.

  • Remote Work Cybersecurity: Best Practices & Trends

    Sponsored by: Kaspersky Lab

    The COVID-19 pandemic has sparked an increase in malware attacks. To make matters worse, many people now find themselves working from home without any special IT awareness training to help them identify cyberattacks. In this e-guide, learn more about how to gain control of your cybersecurity during these times of uncertainty.

  • 5 Identity Attacks that Exploit Your Broken Authentication

    Sponsored by: Okta

    Compromised credentials are the leading cause of data beaches. These credentials can be compromised through a number of attacks, including phishing, credential stuffing and password spraying. In this infographic, learn how your organization can defend against data breaches with strong authentication.

  • Stop Targeted Attacks and Data Loss on G Suite

    Sponsored by: Armorblox

    Today’s cloud-delivered email inboxes require deliberate security measures that go above and beyond traditional on-prem email security practices and tools. Download this solution brief to learn more about Armorblox for G Suite, designed to prevent targeted cyberattacks and data loss on cloud-delivered email platforms.

  • Stop Phishing and Data Loss on Slack

    Sponsored by: Armorblox

    In this brief, learn how Armorblox for Slack can help to stop malicious URLs and attachments, prevent PII/PCI disclosures, and protect against lateral data loss across cloud applications.

  • Stop Targeted Attacks and Data Loss on Office 365

    Sponsored by: Armorblox

    In this brief, learn how Armorblox for Office 365 can help stop targeted email attacks, protect against direct and lateral data loss, and automate remediation of threats reported to the phishing/abuse mailbox.

  • Stop targeted attacks and data loss on Exchange

    Sponsored by: Armorblox

    While email is rapidly moving towards the cloud, most organizations opt for on-premise or hybrid deployments. Unfortunately, cloud-based email security solutions are often ill-equipped to protect hybrid inboxes. Download this solution brief to learn more about a cloud email security platform designed to stop targeted attacks and data loss.

  • 2020 User Risk Report

    Sponsored by: Proofpoint

    Access this white paper to discover user cybersecurity awareness and knowledge gaps while discovering specific actions you can take to empower your people and build up your cyber resilience.

  • Incorporating Technology to Mitigate Email Exploits and Human Error

    Sponsored by: Egress Software Technologies Inc

    Traditional email security approaches are no longer viable in today’s environment. In fact, a recent FBI study indicated that BEC generates more than 50% of all cybercrime revenue. Download this IDC Vendor Spotlight report for a closer look at Egress’ Intelligent Email Security offering, which uses machine learning to enhance threat readiness.

  • Phishing. The biggest threat to SMBs

    Sponsored by: Crosskey Cyber Security

    Phishing emails are the most common threat to small and medium businesses, and their growing efficacy leads to increasingly costly disruptions. In the following article, you’ll find an overview of the signs of a phishing attack, specific examples of what these attacks look like and advice for how employees can protect themselves.

  • Top 10 Security Events to Monitor in Azure Ad and Microsoft 365

    Sponsored by: Quest

    Although cloud environments enable organizations to be more efficient, it often comes at the cost of additional vulnerabilities. In this e-book, take a closer look a 10 security events that administrators track closely to keep their cloud environments secure.

  • Spear Phishing: Top Threats and Trends

    Sponsored by: Barracuda

    Business email compromise (BEC) is an emerging cybersecurity threat that targets user inboxes. While BEC makes up just 7% of spear-phishing attacks, it’s responsible for over $26 billion in losses in the last four years. In this report, explore the latest BEC tactics used by scammers and best practices for protecting your organization.

  • Cool Vendors in Cloud Office Security

    Sponsored by: Armorblox

    As organizations continue to embrace the operational benefits of cloud office suites, security leaders need to ensure that data protection isn’t overlooked. In this Gartner report, take an in-depth look at four key vendors and their innovative approaches to cloud office security, email and collaboration.

  • 13 Email Threat Types to Know about Right Now

    Sponsored by: Barracuda

    As email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.

  • Evolution of Email Security

    Sponsored by: Barracuda

    Ever since it became a critical tool for business communications, email has been the target of increasingly sophisticated cyberattacks. In this webinar, join Barracuda security experts as they overview the evolution of email security from early inbox threats to campaigns taking advantage of the current pandemic.

  • Barracuda Forensics and Incident Response

    Sponsored by: Barracuda

    When it comes to email-based threats, incident response is traditionally a manual process that costs time and money. In this short video, take a closer look at the key features of Barracuda Forensics and Incident Response, which is designed to replace outdated methods with an automated, data-driven approach.

  • Protecting Business and Remote Workers from COVID-19 Email Threats

    Sponsored by: Barracuda

    The recent shift to working remotely as a result of the spread of COVID-19 has made organizations more vulnerable to email-based cyberattacks. This webinar breaks down the various methods being used by hackers and offers best practices for protecting your business and workers.

  • 2020 State of Malware Report

    Sponsored by: Malwarebytes

    Each year, cybercriminals come up with more creative ways to infect organizations, devices and users in order to cause disruptions. In this 2020 State of Malware Report, take a closer look at some of the key attack trends in 2019 and see how the threat landscape has evolved over the last decade.

  • WEBINAR: Protecting Against Coronavirus Email Fraud

    Sponsored by: Armorblox

    Socially engineered attacks are always aligned with what people are talking (or worried) about. So, it should come as no surprise that record amounts of cyberattacks have been using the current Coronavirus pandemic as a lure to cause disruptions. Watch this webinar to learn more about their tactics and how to spot them.

  • How Vendor Email Compromise Works

    Sponsored by: Armorblox

    The FBI updated their estimate of how much money was lost due to Business Email Compromise (BEC) attacks to $26 billion over the past three years, making it one of the costliest forms of cyberattack. Recently, Vendor Email Compromise (VEC), a variant of BEC, has emerged. In this blog post, learn more about VEC and how it differs from BEC.

  • Cloud App Security Report Infographic

    Sponsored by: Trend Micro

    Although less than 400,000 business email compromise (BEC) attacks were recorded in 2019, they accounted for half of all cybercrime losses in 2019 ($1.7 billion). Download this email security threats infographic to learn more about the prevalence of BEC attacks in 2019, as well as phishing and other malware attacks.

  • Coronavirus Credential Phishing

    Sponsored by: Armorblox

    As the spread of the Coronavirus continues to create a sense of uncertainty, cyberattackers have been pushing their efforts to capitalize on people’s doubts and fears. In this white paper, dissect an example of a credential phishing attack: what theses attacks consist of, why it got through & how it was detected.

  • Augmenting Native Office 365 Email Security to Stop Targeted Email Attacks

    Sponsored by: Armorblox

    Email remains the top communication method within and among businesses. In order to take advantage of this, cyberattackers develop targeted campaigns that focus on tricking users into clicking on malware. In this white paper, learn how to complement your existing Office 365 security features with third-party services to stop email attacks.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.