ComputerWeekly.com Research Library

Powered by Bitpipe.com

Email Security Software Research

  • The State of Email Security 2020

    Sponsored by: Mimecast

    The state of email security in 2020 is unlike any other year – as a prominent communication tool in the ‘new normal’, it has seen a surge in both user volume as well as malicious activity. This e-guide provides an in-depth look at key statistics and known threats to provide you with a better understanding of the current state of email security.

  • Combating Threats with the DDoS Defenders at Tata

    Sponsored by: TATA Communications

    In August 2019, one of Tata Communications’ customers was targeted by a 2-wave DDoS attack campaign of unprecedented scale. This video provides an overview of the tactics and methods used by the attacker and highlights how Tata’s analysts were able to identity and isolate the threat.

  • Webinar - Defend Better and Respond Faster With Security That Works Together

    Sponsored by: Cisco Umbrella

    Most malware infections happen in one of only 3 ways, so why aren’t they easier to stop? As organizations embrace the cloud, it’s now imperative to find a new approach to securing users and devices. View this webinar to find out how to stop attacks before they start and how to safeguard your organization with a layered approach to cybersecurity.

  • Reaching Beyond The Perimeter: A Deep Dive into Mimecast’s Email Security 3.0 Strategy

    Sponsored by: Mimecast

    Cybercriminals are at the peak of their powers. They’ve developed specialized tools to dig right into the hearts of businesses and leave without a trace. Email is at the center of this, with 60% of all email sent to organizations being spam or malicious. How does your organization plan to defend? Read this white paper for ideas on strategy.

  • Endpoint Security: A White Paper

    Sponsored by: Orange Business Services

    With endpoints under constant threat from phishing, malware, spyware and viruses, IT departments must consider how they are protecting their employees’ devices. Browse this white paper for a look at how to effectively monitor endpoints as well as the challenges involved in choosing, deploying and managing an endpoint monitoring capability.

  • Cyber Resilience for Email

    Sponsored by: Mimecast

    Did you know that 91% of all cyberattacks start with an email?In the world today, businesses are struggling to keep up with hackers. They need an approach that provides holistic protection, is adaptable and durable, and allows them to recover their data in the event of an attack.Read this white paper for a close look at one such approach.

  • 3 Indicators to Monitor for Business Email Compromise (BEC)

    Sponsored by: CI Security

    Since March 2020, cybercriminals have been exploiting email inboxes at an unprecedented rate with 19-related phishing attacks and business email compromise (BEC) scams. This white paper identifies the 3 most common indicators of a BEC attack, the FBI’s list of BEC red flags, and best practices for lowering your risk.

  • Using Secure Email Gateway to enhance data security in Microsoft Office 365

    Sponsored by: Clearswift

    This solution brief examines the common areas of concern when it comes to securing Office 365 and explores how Clearswift’s SEG may be able to help organizations address these concern areas and ensure protection and visibility across their platform.

  • Six-Step Guide to Email Security Best Practices

    Sponsored by: Clearswift

    The growing reliance on email presents an increasingly lucrative attack vector for cybercriminals. In order to combat this rising threat, organizations need to ensure their email security hygiene is viable. To help you get started, download this white paper from Clearswift, which provides a 6-step guide to email security best practices.

  • You've Got BEC!

    Sponsored by: Proofpoint

    BEC attacks have become bigger and costlier than ever. Toyota Boshoku, a subsidiary of the car manufacturer, lost $37 million to a BEC scam. Toyota is one of many companies that has suffered a loss from this type of email fraud. The good news? There is a layered approach to keep your email accounts and data safe. Open this e-book to learn more.

  • 2019 Proofpoint Domain Fraud Report

    Sponsored by: Proofpoint

    Domain fraud is a growing threat vector in which the threat actor impersonates a trusted brand to launch phishing attacks and other disruptive campaigns. Download this research report to learn more about the latest domain fraud trends – including how the domains are created, common characteristics and more.

  • 5 Identity Attacks that Exploit Your Broken Authentication

    Sponsored by: Okta

    Compromised credentials are the leading cause of data beaches. These credentials can be compromised through a number of attacks, including phishing, credential stuffing and password spraying. In this infographic, learn how your organization can defend against data breaches with strong authentication.

  • 2020 User Risk Report

    Sponsored by: Proofpoint

    Access this white paper to discover user cybersecurity awareness and knowledge gaps while discovering specific actions you can take to empower your people and build up your cyber resilience.

  • The Self-Defending Inbox

    Sponsored by: AWS & DarkTrace

    Phishing, account take-overs and other email-based cyberattacks grow in their severity and frequency each year, and traditional email security methods are becoming increasingly unfit. Download this white paper for an in-depth look at the world’s first self-defending inbox, which leverages AI to protect against attacks.

  • Incorporating Technology to Mitigate Email Exploits and Human Error

    Sponsored by: Egress Software Technologies Inc

    Traditional email security approaches are no longer viable in today’s environment. In fact, a recent FBI study indicated that BEC generates more than 50% of all cybercrime revenue. Download this IDC Vendor Spotlight report for a closer look at Egress’ Intelligent Email Security offering, which uses machine learning to enhance threat readiness.

  • The State of Mobile Phishing

    Sponsored by: Lookout Inc.

    Each year, the mobile phishing becomes increasingly dangerous, causing disruptions across organizations of any size and in every industry. The following mobile phishing report examines the current state of these threats and explores their potential impacts as well as how to protect your organization against them. Read on to get started.

  • Phishing. The biggest threat to SMBs

    Sponsored by: Crosskey Cyber Security

    Phishing emails are the most common threat to small and medium businesses, and their growing efficacy leads to increasingly costly disruptions. In the following article, you’ll find an overview of the signs of a phishing attack, specific examples of what these attacks look like and advice for how employees can protect themselves.

  • Blueprint: Modern Layered Security

    Sponsored by: SonicWall

    The concept of a layered security strategy is nothing new. However, as threats evolve, each layer needs to be revised to ensure it addresses modern security demands. This white paper provides an overview of a comprehensive 11-layer security approach, designed to strengthen your security posture without sacrificing business objectives.

  • Spear Phishing: Top Threats and Trends

    Sponsored by: Barracuda

    Business email compromise (BEC) is an emerging cybersecurity threat that targets user inboxes. While BEC makes up just 7% of spear-phishing attacks, it’s responsible for over $26 billion in losses in the last four years. In this report, explore the latest BEC tactics used by scammers and best practices for protecting your organization.

  • Use Your Microsoft Certificate Authority for Passwordless Authentication

    Sponsored by: Entrust, Inc.

    As a result of the growing risks of weak passwords, organizations are looking beyond passwords towards passwordless authentication. In this solution brief, discover the key features of Entrust Datacard’s passwordless authentication offering, designed to ensure a seamless, secure user experience.

  • 13 Email Threat Types to Know about Right Now

    Sponsored by: Barracuda

    As email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.

  • Evolution of Email Security

    Sponsored by: Barracuda

    Ever since it became a critical tool for business communications, email has been the target of increasingly sophisticated cyberattacks. In this webinar, join Barracuda security experts as they overview the evolution of email security from early inbox threats to campaigns taking advantage of the current pandemic.

  • Barracuda Forensics and Incident Response

    Sponsored by: Barracuda

    When it comes to email-based threats, incident response is traditionally a manual process that costs time and money. In this short video, take a closer look at the key features of Barracuda Forensics and Incident Response, which is designed to replace outdated methods with an automated, data-driven approach.

  • Protecting Business and Remote Workers from COVID-19 Email Threats

    Sponsored by: Barracuda

    The recent shift to working remotely as a result of the spread of COVID-19 has made organizations more vulnerable to email-based cyberattacks. This webinar breaks down the various methods being used by hackers and offers best practices for protecting your business and workers.

  • Cloud App Security Report Infographic

    Sponsored by: Trend Micro

    Although less than 400,000 business email compromise (BEC) attacks were recorded in 2019, they accounted for half of all cybercrime losses in 2019 ($1.7 billion). Download this email security threats infographic to learn more about the prevalence of BEC attacks in 2019, as well as phishing and other malware attacks.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.