Email Threats Research
-
Business email compromise prevention tips
Sponsored by: TechTarget ComputerWeekly.comIt's easy to see why Business Email Compromise attacks work. Preventing them, however, is not so simple -- especially when attackers rely on cognitive biases. Distinguishing between genuine and fraudulent email communications is challenging enough -- and it's also only part of reducing BEC risk. Here are 8 BEC prevention tips for security leaders.
-
Infographic: Business email compromise red flags
Sponsored by: TechTarget ComputerWeekly.comBusiness Email Compromise (BEC) attacks typically target individuals with access to financial records and other sensitive information. However, BEC prevention involves making everyone more aware of email security risks and social engineering red flags. Here are 7 things to look out for when identifying a BEC attack.
-
Who will win the world's biggest cloud contract?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, we examine the $10bn Pentagon cloud contract – codenamed JEDI – and ask why it is taking so long to choose a supplier. We discuss with IT chiefs how AI will transform technology leadership. And we look at how to improve your email security. Read the issue now.
-
Email security: Never more important
Sponsored by: TechTarget ComputerWeekly.comIn this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.
-
Computer Weekly – 24 October 2017: Where will AI take us?
Sponsored by: TechTarget ComputerWeekly.comIn this week's Computer Weekly, artificial intelligence (AI) enthusiasts and sceptics debate the opportunities and risks of the much-hyped technology. Our latest buyer's guide examines the benefits of cloud-native applications. And we look at best practice in defending email systems from cyber attacks. Read the issue now.
-
Security Threat Report: July 2009 Update
Sponsored by: SophosBusinesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.
-
eBook - Email Archiving: Planning, Policies and Product Selection - Chapter 1: Email-Archiving Project Roadmap
Sponsored by: TechTarget Search Windows ServerGet the fundamentals of email archiving from start to finish in this e-book, “Email Archiving: Planning, policies and product selection.” Each chapter of this e-book will guide IT managers through the individual phases of the email-archiving project process.
-
Stopping data leakage: Exploiting your existing security investment
Sponsored by: SophosThis paper gives practical guidance on how to use current investments in IT security technologies at the gateway and endpoint to support a high-profile acceptable use policy for data leakage prevention, and describes where new investments should be made.
-
Why Your Organization Needs to Focus on Outbound Content: An Osterman Research White Paper
Sponsored by: Symantec CorporationThis paper focuses on the need to monitor and manage outbound content, discusses the key drivers that are making it necessary and details 3 steps that an organization should take to mitigate the risks it faces from employee use of communication tools.
-
Mail Security for Microsoft Exchange Server
Sponsored by: Symantec CorporationThis Podcast explores the key features and benefits of Mail Security 5.0 including a new user interface, an enhanced content filtering rules, new user group based rules, and windows cluster support.
-
Messaging and Collaboration Security: Microsoft's Multi-layer Approach - Podcast
Sponsored by: MicrosoftAttend this podcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.
-
Enterprise Messaging Security and Management
Sponsored by: Symantec CorporationEmail is a mission-critical application for business and will grow annually 25-30% through 2009. This paper examines how to secure and simplify the management of your messaging infrastructure and ensure the security your electronic communic...
-
Messaging and Collaboration Security: Microsoft's Multi-layer Approach
Sponsored by: MicrosoftAttend this webcast and learn about the latest messaging security strategies from Microsoft that help enable secure remote and mobile access. Learn how to protect your company's messages and defend against viruses, spam and other security threats.
-
Microsoft Forefront Security for Exchange Server Beta
Sponsored by: MicrosoftForefront Security for Exchange helps protect your email infrastructure from infection and downtime through an approach that emphasizes layered defenses, optimization of Exchange Server performance and availability, and simplified management control.
-
Why One Virus Engine Is Not Enough
Sponsored by: GFI SoftwareThis white paper explains the importance of response time, shows the response time differences between virus engines, and explains why having multiple scanners at mail server level decreases the average response time.
-
Sophos Email Security Appliances
Sponsored by: SophosThe Sophos Email Security Appliance offers high-capacity, high-availability security for your email network, delivering protection updates every five minutes and providing the most up-to-date email security available.