ComputerWeekly.com Research Library

Powered by Bitpipe.com

Email Security Research

  • Cybercrime Tactics and Techniques: Ransomware Retrospective

    Sponsored by: Malwarebytes

    In this edition of Cybercrime Tactics and Techniques, take an in-depth look into ransomware attacks over the past few years – attack methods, common targets and notable subcategories. In addition, this report will consider where ransomware will go next, and how to prepare. Read on to reveal the full report.

  • Pervasive Protection: Enabling Secure Work from Anywhere

    Sponsored by: Malwarebytes

    The digitally transformed workplace consists of employees that expect to get their work done anywhere. This mix of onsite and remote workers, as well as the explosion of devices and applications they now use, presents a security challenge. In this infographic, find out what security managers need to know to defend against today’s cyberattacks.

  • Your Email Security is Ineffective, and Getting Worse

    Sponsored by: Ironscales

    The impacts of phishing attacks continue to expose the gaps in current email security tactics and highlights why organizations need to adapt their existing approach to meet the requirements of modern threats. Read on to uncover the key data insights from this Aberdeen study into the email security landscape.

  • How to Conquer Phishing? Beat the Clock

    Sponsored by: Ironscales

    Reducing the risk of phishing attacks is a race against time – defenders must respond before their own users are to open emails and click on malicious links. In fact, Aberdeen’s research show that defenders have a median of 134 seconds to respond. Continue to uncover the remaining key data points related to this phishing attacks research.

  • Business Email Compromise: The Catalyst for Mailbox Level Email Security

    Sponsored by: Ironscales

    As phishing attack grow in sophistication, organizations must establish security protocols to meet these evolving threats. One emerging threat is business email compromise (BEC), which affects more than 500 businesses per day. In this white paper, go in-depth into BEC, what makes it so successful and how organizations can mitigate the risks.

  • The Seven Essentials of a Modern Email Security Platform

    Sponsored by: Ironscales

    Businesses of all sizes face the risk of data loss from email phishing campaigns, and existing security solutions can’t keep pace with evolving attack methods. In this playbook, uncover the 7 essentials needed to enable email security, and discover why employees are the top method of threat detection.

  • The Weakest Link

    Sponsored by: Area 1 Security

    Phishing attacks are growing increasingly complex. Hackers are now targeting affiliates within an organization’s digital supply chain as an entry point into their target’s network. In this white paper, uncover tactics used in past supply chain phishing attacks and learn how to detect and mitigate these threats.

  • Why Secure Email Gateways Fail to Catch Phish

    Sponsored by: Area 1 Security

    Phishing attacks are becoming difficult for secure email gateways (SEGs) to detect and mitigate, leading to resource-intensive remediation efforts. But why are SEGs failing? This e-book goes in-depth into why SEGs are ineffective at catching phishing attacks and explores what you can do to improve your email security.

  • Whack-a-phish

    Sponsored by: Area 1 Security

    Traditional email security defenses rely on past data to detect the next attack, and therefore can’t defend against modern continually evolving phishing methods. Protection from modern attacks requires a proactive approach to security. Read on to learn more about forward-looking security technology for phishing attacks.

  • When the Cloud Rains Phish

    Sponsored by: Area 1 Security

    When it comes to phishing attacks, every inbox is a prime target. Hackers are discovering more sophisticated methods for targeting employees that have adapted to overcome world-class defenses. Read this white paper to uncover the modern threats the users encounter and discover how to remedy them.

  • State of the Internet: Financial Services Attack Economy

    Sponsored by: Akamai Technologies

    The financial service industry faces a wide area of cybersecurity threats, including password problems, phishing, mobile application attacks, and more. Being aware of the most current attack trends can be critical for the security of sensitive data. This research report breaks down the specific challenges and threats within the industry.

  • Best Practices Award: Email Security Global

    Sponsored by: Mimecast

    The trend towards cloud migration for email security adds new levels of complexity for organizations, and the increase in email-based threats means the need for secure email is critical to the protection of sensitive data. Read this research report to explore the top industry challenges and best practices as they relate to email security.

  • The ROI of Security Awareness Training

    Sponsored by: Mimecast

    When it comes to developing a security strategy to protect your organization’s sensitive data, it’s critical to consider both the people within your environment as well as the technology. In this white paper, review the results of in-depth research recently conducted by Osterman Research and discover the need for security awareness programs.

  • Moorabool Shire Council Case Study

    Sponsored by: Mimecast

    In this case study, discover how Moorabool Shire Council was able to immediately reduce the number of phishing and whaling attacks in order to reduce IT workload while maintaining security for the 250 email users within their municipality.

  • Email Security Risk Assessment for Microsoft Office 365

    Sponsored by: Mimecast

    View this infographic that reveals the results of Email Security Risk Assessment tests showing the number and type of unwanted and dangerous emails missed by organizations’ Microsoft Office 365 implementations.

  • Ransomware Attacks: How to Get the Upper Hand

    Sponsored by: Cisco Umbrella

    The rock group Radiohead is celebrated for its unconventional approach to recording and releasing music. Lately, the band is also turning heads for how it handled a hacker trying to sell its unreleased work. In this e-guide learn what security experts think of Radiohead’s strategy for dealing with the ransomware threat.

  • Guide to Eliminating the Top 3 Security Pain Points

    Sponsored by: Menlo Security

    In this webinar, leverage the knowledge of industry experts at 451 research and Menlo Security to uncover the most significant information security pain points and strategic recommendations for eliminating them.

  • Create an Effective Email Phishing Test in 7 Steps

    Sponsored by: Cisco Umbrella

    The best way for IT to improve email phishing security is through comprehensive testing, which helps identity which users are susceptible and what type of fake email is more effective. Dive into this e-guide to learn how to create an effective email phishing test in 7 steps.

  • Stopping Advanced Malware: A SANS Review of enSilo’s Endpoint Security Platform

    Sponsored by: enSilo

    With attackers growing more and more savvy, IT teams require additional resources in order to properly protect increasing endpoints. enSilo conducted a survey with SANS to gain insight into endpoint security challenges and tactics. Read on to uncover the research results.

  • Endpoint Security Buyer’s Guide: Protect, Detect, Respond

    Sponsored by: Tanium

    Endpoints are critical to protect, as they are the most common areas for cyberattacks and breaches. This buyer’s guide is designed to help your organization evaluate endpoint security capabilities and identify gaps by focusing on the key aspects of various endpoint security tactics. Download this guide to get started.

  • One Fish, Two Fish, Three Fish, Fraud Fish

    Sponsored by: Splunk

    In this Dr. Seuss style storybook, discover how numerous types of fraud, such as credit card, phishing, account takeover, and more can affect your organization.

  • Attackers are Targeting your Company’s Most Valuable Resource: Your People

    Sponsored by: Proofpoint

    Gaining true visibility into the state of cyber-risk requires organizations to address the need to protect people against attacks at 3 different levels. And when we say “people” we’re not just talking about senior execs/the c-suite. Download and discover how to more effectively address 3 major problem areas in today’s enterprise.

  • Executive Report: Phishing by the Numbers

    Sponsored by: Inky Technology

    View this report that breaks down some of the critical phishing attack statistics for the past year and reveals the 7 most common phishing themes to watch out for in 2020.

  • Understanding Phishing: Fake Attachments

    Sponsored by: Inky Technology

    Malicious fake attachments are a trend that has security pros on the alert.So how can you spot them at first glance and before they do serious damage? This special phishing report for security pros reveals exactly how it’s done.

  • Dutch DIY Giant Shelves Email Attacks

    Sponsored by: Barracuda

    As email impersonation attacks and CEO fraud pick up momentum worldwide, Intergamma IT Manager Ruud Bronswijk knew there was an urgent need to improve the DIY company’s defenses. To discover how Intergamma ultimately bolstered their Office 365 security to thwart a variety of email-based attacks, download the case study here.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.