ComputerWeekly.com Research Library

Powered by Bitpipe.com

Email Security Research

  • The Sunshine Laws, Freedom of Information and Compliance

    Sponsored by: Egress Software Technologies Inc

    Learn how you can use Egress to minimize response time to information requests and avoid a costly violation.

  • Spear Phishing: Top Threats and Trends

    Sponsored by: Barracuda

    Business email compromise (BEC) is an emerging cybersecurity threat that targets user inboxes. While BEC makes up just 7% of spear-phishing attacks, it’s responsible for over $26 billion in losses in the last four years. In this report, explore the latest BEC tactics used by scammers and best practices for protecting your organization.

  • The Big Easy - 3 steps for better security

    Sponsored by: Cisco Umbrella

    In this video, take a look at the 3 most common threat vectors, and discover best-practices for detecting, isolating and mitigating these threats before they have a chance to strike.

  • Use Your Microsoft Certificate Authority for Passwordless Authentication

    Sponsored by: Entrust, Inc.

    As a result of the growing risks of weak passwords, organizations are looking beyond passwords towards passwordless authentication. In this solution brief, discover the key features of Entrust Datacard’s passwordless authentication offering, designed to ensure a seamless, secure user experience.

  • Cool Vendors in Cloud Office Security

    Sponsored by: Armorblox

    As organizations continue to embrace the operational benefits of cloud office suites, security leaders need to ensure that data protection isn’t overlooked. In this Gartner report, take an in-depth look at four key vendors and their innovative approaches to cloud office security, email and collaboration.

  • 13 Email Threat Types to Know about Right Now

    Sponsored by: Barracuda

    As email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.

  • Securing Your Business During the COVID-19 Crisis

    Sponsored by: Barracuda

    Like you, Barracuda is adjusting to having everybody working from home. That’s why they’ve created a new webinar that shares insights about the key security challenges that this change entails, and how to overcome them. View now to gain actionable insights about how to keep your business secure in this extraordinary time.

  • Evolution of Email Security

    Sponsored by: Barracuda

    Ever since it became a critical tool for business communications, email has been the target of increasingly sophisticated cyberattacks. In this webinar, join Barracuda security experts as they overview the evolution of email security from early inbox threats to campaigns taking advantage of the current pandemic.

  • 2019 eSentire Annual Threat Intelligence Report

    Sponsored by: eSentire

    Eliminate guesswork and get in-depth insights and practical recommendations for navigating the ever-changing cybercrime landscape. Download this report to learn what attacks are targeting mid-sized organizations and the security strategies you need to safeguard your business.

  • Barracuda Forensics and Incident Response

    Sponsored by: Barracuda

    When it comes to email-based threats, incident response is traditionally a manual process that costs time and money. In this short video, take a closer look at the key features of Barracuda Forensics and Incident Response, which is designed to replace outdated methods with an automated, data-driven approach.

  • A Guide to DNS Security & How it Addresses DDoS Attacks

    Sponsored by: TechTarget

    DDoS attacks are unique in the way that target and infect an organizations bandwidth, leading to long downtimes and costly disruptions. Written by out networks security experts, our DDoS e-guide explores the anatomy of various DDoS attacks and offers best practices for defending against them. Take our short survey to receive your free copy.

  • Barracuda Essentials Overview

    Sponsored by: Barracuda

    In this short video, learn how you can protect your business from advanced email threats like ransomware, phishing, and data loss with Barracuda Essentials.

  • Five Security Priorities to Consider with a Remote Workforce

    Sponsored by: Ivanti SEA

    Network security is just one of the countless business operation areas affected by the spread of COVID-19. Email-based cyberattacks are on the rise, and networks have never been more vulnerable. In this article, discover 5 strategic recommendations for how to prioritize security in these trying times.

  • Protecting Business and Remote Workers from COVID-19 Email Threats

    Sponsored by: Barracuda

    The recent shift to working remotely as a result of the spread of COVID-19 has made organizations more vulnerable to email-based cyberattacks. This webinar breaks down the various methods being used by hackers and offers best practices for protecting your business and workers.

  • Maintaining ‘Business as Usual’ In Unusual Circumstances

    Sponsored by: ProAct

    Each year, cyberattackers implement new ways to bypass security tactics and trigger costly disruptions to business operations. However, with the right preparation your IT security team can be positioned to deal with these dangers. In this white paper, take a closer look at today’s threat vectors and learn your team can overcome them.

  • 2020 State of Malware Report

    Sponsored by: Malwarebytes

    Each year, cybercriminals come up with more creative ways to infect organizations, devices and users in order to cause disruptions. In this 2020 State of Malware Report, take a closer look at some of the key attack trends in 2019 and see how the threat landscape has evolved over the last decade.

  • WEBINAR: Protecting Against Coronavirus Email Fraud

    Sponsored by: Armorblox

    Socially engineered attacks are always aligned with what people are talking (or worried) about. So, it should come as no surprise that record amounts of cyberattacks have been using the current Coronavirus pandemic as a lure to cause disruptions. Watch this webinar to learn more about their tactics and how to spot them.

  • How Vendor Email Compromise Works

    Sponsored by: Armorblox

    The FBI updated their estimate of how much money was lost due to Business Email Compromise (BEC) attacks to $26 billion over the past three years, making it one of the costliest forms of cyberattack. Recently, Vendor Email Compromise (VEC), a variant of BEC, has emerged. In this blog post, learn more about VEC and how it differs from BEC.

  • Cloud App Security Report Infographic

    Sponsored by: Trend Micro

    Although less than 400,000 business email compromise (BEC) attacks were recorded in 2019, they accounted for half of all cybercrime losses in 2019 ($1.7 billion). Download this email security threats infographic to learn more about the prevalence of BEC attacks in 2019, as well as phishing and other malware attacks.

  • Coronavirus Credential Phishing

    Sponsored by: Armorblox

    As the spread of the Coronavirus continues to create a sense of uncertainty, cyberattackers have been pushing their efforts to capitalize on people’s doubts and fears. In this white paper, dissect an example of a credential phishing attack: what theses attacks consist of, why it got through & how it was detected.

  • Egress Intelligent Email Security for Banks and Credit Unions

    Sponsored by: Egress Software Technologies Inc

    Learn how Egress Intelligent Email Security uses powerful contextual machine learning to ensure emails are delivered to the correct recipient with the right level of security applied.

  • Boosting Cybersecurity Immunity: Confronting Risks in Today’s Work-From-Home world

    Sponsored by: Capgemini

    The spread of COVID-19 has led to a massive and dramatic shift towards working from home and a major increase in email attacks. Learn how you can address the heightened cybersecurity risks that come with the shift towards remote workers and mobile devices.

  • Augmenting Native Office 365 Email Security to Stop Targeted Email Attacks

    Sponsored by: Armorblox

    Email remains the top communication method within and among businesses. In order to take advantage of this, cyberattackers develop targeted campaigns that focus on tricking users into clicking on malware. In this white paper, learn how to complement your existing Office 365 security features with third-party services to stop email attacks.

  • Creating a Security Culture at Your Business

    Sponsored by: TechData - Microsoft

    The most persistent threat to the security of an organization is its own employees. 2/3 of employees use the same password everywhere, and too few can recognize a genuine email from a phishing scam. In this video, learn how Microsoft may be able to address these challenges and help you form a security culture.

  • How to Protect Data with Microsoft 365 Business

    Sponsored by: TechData - Microsoft

    52% of today’s data leaks are the result of human error – from bad password practices to email scams. In order to overcome these challenges, organizations should equip employees with the knowledge and tools to better understand threats. This infographic illustrates how Microsoft 365 Business can help your organization protect its data.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.