ComputerWeekly.com Research Library

Powered by Bitpipe.com

Email Threats Research

  • Business email compromise prevention tips

    Sponsored by: TechTarget ComputerWeekly.com

    It's easy to see why Business Email Compromise attacks work. Preventing them, however, is not so simple -- especially when attackers rely on cognitive biases. Distinguishing between genuine and fraudulent email communications is challenging enough -- and it's also only part of reducing BEC risk. Here are 8 BEC prevention tips for security leaders.

  • Infographic: Business email compromise red flags

    Sponsored by: TechTarget ComputerWeekly.com

    Business Email Compromise (BEC) attacks typically target individuals with access to financial records and other sensitive information. However, BEC prevention involves making everyone more aware of email security risks and social engineering red flags. Here are 7 things to look out for when identifying a BEC attack.

  • Danger within: email and security awareness training strategies for effective account takeover protection

    Sponsored by: Mimecast

    It’s a common misconception that email-borne attacks come only from outside the organisations. Can your employees discern an impersonation email or email attack using a legitimate internal account? How good is your security posture? Take a look at this whitepaper how you can create more effective email security as well as a more vigilant workforce.

  • Who will win the world's biggest cloud contract?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, we examine the $10bn Pentagon cloud contract – codenamed JEDI – and ask why it is taking so long to choose a supplier. We discuss with IT chiefs how AI will transform technology leadership. And we look at how to improve your email security. Read the issue now.

  • Email security: Never more important

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.

  • Computer Weekly – 24 October 2017: Where will AI take us?

    Sponsored by: TechTarget ComputerWeekly.com

    In this week's Computer Weekly, artificial intelligence (AI) enthusiasts and sceptics debate the opportunities and risks of the much-hyped technology. Our latest buyer's guide examines the benefits of cloud-native applications. And we look at best practice in defending email systems from cyber attacks. Read the issue now.

  • Webmail Forensics: Investigating Issues with Email Forwarding Security

    Sponsored by: TechTarget Security

    In this expert e-guide, application security expert Mike Cobb discusses webmail forensics possibilities for dealing with the aftermath of an issue involving email forwarding. Discover how to avoid these issues with your webmail and employees.

  • Email Security Best Practices for Email Security as a Service

    Sponsored by: TechTarget Security

    In this expert e-guide, you will discover email security best practices for email security as a service and how to establish them in your organization.

  • Improving Enterprise Email Security: Systems and Tips

    Sponsored by: TechTarget Security

    This expert resource provides valuable information regarding e-mail security today, including the tools and techniques you can use to stay secure. Read on to learn more about e-mail reputation management, e-mail filtering, policy-based encryption, and more.

  • Advanced cybersecurity fraud and how to fight it

    Sponsored by: TechTarget Security

    Fraud is as ancient as time, but cybersecurity fraud is hitting heights of sophistication the ancient Greeks never imagined. Learn the latest cyberfraud scams and how to thwart them with a combination of processes, tools and education.

  • What secure email gateways can do for your enterprise

    Sponsored by: TechTarget Security

    It is important to evaluate secure email gateways before implementing them in your organization. Here's a look at some of the best email security gateway products in the industry, as well as implementation, cost and uses.

  • Email Security: Never more important

    Sponsored by: TechTarget ComputerWeekly.com

    In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.

  • Create an Effective Email Phishing Test in 7 Steps

    Sponsored by: Cisco Umbrella

    The best way for IT to improve email phishing security is through comprehensive testing, which helps identity which users are susceptible and what type of fake email is more effective. Dive into this e-guide to learn how to create an effective email phishing test in 7 steps.

  • The Best Email Security Comes Through Strategy and Tactics

    Sponsored by: TechTarget Security

    Achieving the best email security possible should be a top InfoSec priority. Why? Attackers work day and night thinking up new ways to bypass IT security. In this security handbook, learn how to approach email security both strategically and tactically.

  • Crunching the Costs of Microsoft Exchange On-premises vs. Cloud Services

    Sponsored by: Riverbed Technology, Inc.

    Download this expert guide to learn how to calculate the costs of on-premises Exchange versus those of Office 365's mail service, and from this assessment deduce if the O365 cloud is your enterprise's best option for collaboration. Discover new cost factors such as electricity, bandwidth needs, personnel expenses, and more.

  • How Global Threat Intelligence Fits into a Security Strategy

    Sponsored by: IBM

    Before considering global threat intelligence services, there are some critical dangers that you may need to address closer to home. In this e-guide, Rob Shapland shares his advice on how simple tools like staff training and awareness can help prevent breaches from phishing attacks and more.

  • Squash Large Business Email Security Challenges

    Sponsored by: Intermedia Net

    If you're a large enterprise, your security needs are unique. So don't take advice from a small organization, and learn how to accommodate the challenges specific to your size. This exclusive e-guide explores some Exchange security challenges and considerations that large enterprises face on a daily basis.

  • Secure Mobile Email for the Lean IT Department

    Sponsored by: Shavlik Technologies

    This expert whitepaper explores how you can keep you end-users happy and your corporate information safe in the age of mobile email.

  • Improve Enterprise Email Systems with HP Messaging Services

    Sponsored by: Hewlett-Packard Enterprise

    Find out how HP Messaging Services can increase the reliability and performance of email systems, and help better manage your infrastructure with consistent, efficient and cost-competitive services.

  • Consultants: How Can You Secure Your Information with Customers?

    Sponsored by: Globalscape

    This case study focuses on management consulting firm Arthur D. Little's experience with an enterprise-level file exchange solution that was easy to use, secure, rapid to deploy, and scalable.

  • Mitigating Email Virus Attacks

    Sponsored by: Cisco

    This exclusive white paper discusses how your organization can best mitigate email virus attacks, examining helpful solutions and strategies that you can use to ensure that your sensitive data is kept secure.

  • Mitigating Email Virus Attacks

    Sponsored by: Cisco

    Access this resource to explore the emerging e-mail threat landscape that includes inbound and outbound risks. Read on to discover a simplified management solution that boosts defenses at a lower TCO.

  • Discover How Mail Express Solves 2 of Your Biggest IT Headaches

    Sponsored by: Globalscape

    Mail Express can easily solve your most troublesome headaches surrounding email and it can reduce costs, too. Get all the answers instantly when you download this whitepaper.

  • Webmail Forensics: Investigating Issues with Email Forwarding Security

    Sponsored by: Kaspersky

    This expert guide will help you learn more about what it takes in order to make sure your organization has an effective forensic readiness plan ready. Read on and learn how to prepare your plan today.

  • Email Security Technical Guide

    Sponsored by: TechTarget Security

    Check out this expert guide to learn about how to handle the onslaught of e-mail attacks that plague organizations today. Discover best practices, techniques and system options that can help you stay secure.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2024 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.