ComputerWeekly.com Research Library

Powered by Bitpipe.com

Email Threats Research

  • Understanding Phishing: Banner Effectiveness

    Sponsored by: Inky Technology

    Putting banners in email to alert recipients to the potential dangers lurking in messages can be a highly effective way to keep employees safe from phishing attacks. But for this to be effective, you have to know which emails to flag. View this white paper to learn how INKY’s Phish Fence determines which emails to warn users about.

  • Omdia Market Radar: Outbound Email Security

    Sponsored by: Zivver

    Email is a powerful instrument for sending messages anywhere, to anyone, so much so that it has become a universal tool of communication, both within and beyond the business environment. The OMDIA Market Radar provides an overview of solutions to prevent non-cyber related issues in digital communications today. Read on to learn more.

  • Spear Phishing vol2: Top Threats and Trends. Email account takeover, Defending against lateral phishing

    Sponsored by: Barracuda

    This report takes an in-depth look at lateral phishing tactics. Read on to gain exclusive insight into recipient targeting strategies, the 10 most common words used in lateral phishing emails, 3 ways to defend against lateral phishing, and more.

  • Who will win the world's biggest cloud contract?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we examine the $10bn Pentagon cloud contract – codenamed JEDI – and ask why it is taking so long to choose a supplier. We discuss with IT chiefs how AI will transform technology leadership. And we look at how to improve your email security. Read the issue now.

  • Email Security: Never more important

    Sponsored by: ComputerWeekly.com

    In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.

  • Email security: Never more important

    Sponsored by: ComputerWeekly.com

    In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.

  • Computer Weekly – 24 October 2017: Where will AI take us?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, artificial intelligence (AI) enthusiasts and sceptics debate the opportunities and risks of the much-hyped technology. Our latest buyer's guide examines the benefits of cloud-native applications. And we look at best practice in defending email systems from cyber attacks. Read the issue now.

  • Webmail Forensics: Investigating Issues with Email Forwarding Security

    Sponsored by: SearchSecurity.com

    In this expert e-guide, application security expert Mike Cobb discusses webmail forensics possibilities for dealing with the aftermath of an issue involving email forwarding. Discover how to avoid these issues with your webmail and employees.

  • Email Security Best Practices for Email Security as a Service

    Sponsored by: SearchSecurity.com

    In this expert e-guide, you will discover email security best practices for email security as a service and how to establish them in your organization.

  • Improving Enterprise Email Security: Systems and Tips

    Sponsored by: SearchSecurity.com

    This expert resource provides valuable information regarding e-mail security today, including the tools and techniques you can use to stay secure. Read on to learn more about e-mail reputation management, e-mail filtering, policy-based encryption, and more.

  • Advanced cybersecurity fraud and how to fight it

    Sponsored by: SearchSecurity.com

    Fraud is as ancient as time, but cybersecurity fraud is hitting heights of sophistication the ancient Greeks never imagined. Learn the latest cyberfraud scams and how to thwart them with a combination of processes, tools and education.

  • What secure email gateways can do for your enterprise

    Sponsored by: SearchSecurity.com

    It is important to evaluate secure email gateways before implementing them in your organization. Here's a look at some of the best email security gateway products in the industry, as well as implementation, cost and uses.

  • Create an Effective Email Phishing Test in 7 Steps

    Sponsored by: Cisco Umbrella

    The best way for IT to improve email phishing security is through comprehensive testing, which helps identity which users are susceptible and what type of fake email is more effective. Dive into this e-guide to learn how to create an effective email phishing test in 7 steps.

  • The Best Email Security Comes Through Strategy and Tactics

    Sponsored by: SearchSecurity.com

    Achieving the best email security possible should be a top InfoSec priority. Why? Attackers work day and night thinking up new ways to bypass IT security. In this security handbook, learn how to approach email security both strategically and tactically.

  • Crunching the Costs of Microsoft Exchange On-premises vs. Cloud Services

    Sponsored by: Riverbed Technology, Inc.

    Download this expert guide to learn how to calculate the costs of on-premises Exchange versus those of Office 365's mail service, and from this assessment deduce if the O365 cloud is your enterprise's best option for collaboration. Discover new cost factors such as electricity, bandwidth needs, personnel expenses, and more.

  • How Global Threat Intelligence Fits into a Security Strategy

    Sponsored by: IBM

    Before considering global threat intelligence services, there are some critical dangers that you may need to address closer to home. In this e-guide, Rob Shapland shares his advice on how simple tools like staff training and awareness can help prevent breaches from phishing attacks and more.

  • Squash Large Business Email Security Challenges

    Sponsored by: Intermedia Net

    If you're a large enterprise, your security needs are unique. So don't take advice from a small organization, and learn how to accommodate the challenges specific to your size. This exclusive e-guide explores some Exchange security challenges and considerations that large enterprises face on a daily basis.

  • Secure Mobile Email for the Lean IT Department

    Sponsored by: Shavlik Technologies

    This expert whitepaper explores how you can keep you end-users happy and your corporate information safe in the age of mobile email.

  • Improve Enterprise Email Systems with HP Messaging Services

    Sponsored by: Hewlett-Packard Enterprise

    Find out how HP Messaging Services can increase the reliability and performance of email systems, and help better manage your infrastructure with consistent, efficient and cost-competitive services.

  • Consultants: How Can You Secure Your Information with Customers?

    Sponsored by: Globalscape

    This case study focuses on management consulting firm Arthur D. Little's experience with an enterprise-level file exchange solution that was easy to use, secure, rapid to deploy, and scalable.

  • Mitigating Email Virus Attacks

    Sponsored by: Cisco

    This exclusive white paper discusses how your organization can best mitigate email virus attacks, examining helpful solutions and strategies that you can use to ensure that your sensitive data is kept secure.

  • Mitigating Email Virus Attacks

    Sponsored by: Cisco

    Access this resource to explore the emerging e-mail threat landscape that includes inbound and outbound risks. Read on to discover a simplified management solution that boosts defenses at a lower TCO.

  • Discover How Mail Express Solves 2 of Your Biggest IT Headaches

    Sponsored by: Globalscape

    Mail Express can easily solve your most troublesome headaches surrounding email and it can reduce costs, too. Get all the answers instantly when you download this whitepaper.

  • Webmail Forensics: Investigating Issues with Email Forwarding Security

    Sponsored by: Kaspersky

    This expert guide will help you learn more about what it takes in order to make sure your organization has an effective forensic readiness plan ready. Read on and learn how to prepare your plan today.

  • Email Security Technical Guide

    Sponsored by: SearchSecurity.com

    Check out this expert guide to learn about how to handle the onslaught of e-mail attacks that plague organizations today. Discover best practices, techniques and system options that can help you stay secure.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.