ComputerWeekly.com Research Library

Powered by Bitpipe.com

Email Research

  • Human Factor Report

    Sponsored by: Proofpoint

    Download the Human Factor Report, based on threat data from more than a billion email messages per day, to learn how attackers exploit human nature to trick users into installing malware, wiring money in fraudulent transactions, handing over sensitive data, and more.

  • Inspecting a Phishing Campaign using Cisco Talos

    Sponsored by: Cisco Umbrella

    Join this video demo as security experts look into a phishing campaign that was set up to phish users’ credentials by leveraging interest in the global pandemic.

  • The Sunshine Laws, Freedom of Information and Compliance

    Sponsored by: Egress Software Technologies Inc

    Learn how you can use Egress to minimize response time to information requests and avoid a costly violation.

  • Use Your Microsoft Certificate Authority for Passwordless Authentication

    Sponsored by: Entrust, Inc.

    As a result of the growing risks of weak passwords, organizations are looking beyond passwords towards passwordless authentication. In this solution brief, discover the key features of Entrust Datacard’s passwordless authentication offering, designed to ensure a seamless, secure user experience.

  • Cool Vendors in Cloud Office Security

    Sponsored by: Armorblox

    As organizations continue to embrace the operational benefits of cloud office suites, security leaders need to ensure that data protection isn’t overlooked. In this Gartner report, take an in-depth look at four key vendors and their innovative approaches to cloud office security, email and collaboration.

  • 13 Email Threat Types to Know about Right Now

    Sponsored by: Barracuda

    As email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.

  • Evolution of Email Security

    Sponsored by: Barracuda

    Ever since it became a critical tool for business communications, email has been the target of increasingly sophisticated cyberattacks. In this webinar, join Barracuda security experts as they overview the evolution of email security from early inbox threats to campaigns taking advantage of the current pandemic.

  • Barracuda Essentials Overview

    Sponsored by: Barracuda

    In this short video, learn how you can protect your business from advanced email threats like ransomware, phishing, and data loss with Barracuda Essentials.

  • Egress Intelligent Email Security for Banks and Credit Unions

    Sponsored by: Egress Software Technologies Inc

    Learn how Egress Intelligent Email Security uses powerful contextual machine learning to ensure emails are delivered to the correct recipient with the right level of security applied.

  • Trends in Email Security

    Sponsored by: Armorblox

    Phishing attacks are on the rise this year and this ESG report has the numbers to prove it. Download the report to uncover email security trends for 2020 and learn how your organization can stay protected from targeted attacks such as business email compromise, account takeover, and impersonation.

  • Inbound and Outbound Email Protection

    Sponsored by: Armorblox

    Email attacks today are laser targeted and evade traditional detection by preying on human nature. That’s why organizations today need an email security platform that protects against targeted attacks such as BEC, account takeover, and executive impersonations. View this data sheet to learn about Armorblox’s platform features and benefits.

  • Email security: Never more important

    Sponsored by: ComputerWeekly.com

    In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.

  • Dutch DIY Giant Shelves Email Attacks

    Sponsored by: Barracuda

    As email impersonation attacks and CEO fraud pick up momentum worldwide, Intergamma IT Manager Ruud Bronswijk knew there was an urgent need to improve the DIY company’s defenses. To discover how Intergamma ultimately bolstered their Office 365 security to thwart a variety of email-based attacks, download the case study here.

  • Spear Phishing: Top Threats and Trends

    Sponsored by: Barracuda

    This report takes an in-depth look at lateral phishing tactics. Read on to gain exclusive insight into recipient targeting strategies, the 10 most common words used in lateral phishing emails, 3 ways to defend against lateral phishing, and more.

  • The Rise of Email Threats

    Sponsored by: Barracuda

    The following report digs into the current state of email security, evaluating the evolution of email threats and identifying common concerns. Download now to view these takeaways and to learn how to equip your organization with the necessary defenses to fend off email attacks.

  • Who will win the world's biggest cloud contract?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we examine the $10bn Pentagon cloud contract – codenamed JEDI – and ask why it is taking so long to choose a supplier. We discuss with IT chiefs how AI will transform technology leadership. And we look at how to improve your email security. Read the issue now.

  • Special Report: 2019 Email Security Trends

    Sponsored by: Barracuda

    How can you keep your pulse on the evolving threat landscape? Download the following report, which illustrates the current state of email security and spotlights trends around security spending, malware and phishing, Office 365 security, and more.

  • Email security: Never more important

    Sponsored by: ComputerWeekly.com

    In this e-guide, we look at why businesses need to address email security with a combination of awareness training and automated tools to reduce the likelihood of infection and speed up the detection of and response to email-borne threats.

  • Agile Software Testing Pioneer Slams the Door on C-level Email Attacks

    Sponsored by: Barracuda

    Learn how Tricentis, an automated software testing company, was able to thwart spear-phishing and fraud attacks against senior staff.

  • Securing Office 365 Email with Isolation

    Sponsored by: Menlo Security

    An isolation platform can address many of the gaps in email and web security, that are currently left unaddressed by attackers in Office 365. Read on to learn about the benefits of an isolation platform and how it can help protect users from web-borne malware attacks via drive-by downloads, watering-hole attacks, malvertising, and much more.

  • Email Protection with Asaf Cidon

    Sponsored by: Barracuda

    Asaf Cidon, VP of Email Protection at Barracuda, will highlight how to combat these new threats and improve your email security posture in this video. Tune in for tactical guidance on preventing damage to your brand and fending off attackers that would otherwise harvest your sensitive information.

  • The Rise of Spear Phishing Attacks & Email Fraud

    Sponsored by: Barracuda

    Almost half of UK organizations have been compromised in the past two years using phishing attacks, despite high levels of cyber awareness and training, research shows. Download this e-guide to learn about the rise of phishing and email security, today.

  • No Kidnapping, No Ransom

    Sponsored by: Panda Security

    Don't miss this opportunity to learn how to protect your company from the increasing cyber threat of ransomware, which has cost around $5 billion in 2017 alone. Download this white paper and discover 7 ways to avoid these ransomware attacks.

  • Create an Effective Email Phishing Test in 7 Steps

    Sponsored by: Cisco Umbrella

    The best way for IT to improve email phishing security is through comprehensive testing, which helps identity which users are susceptible and what type of fake email is more effective. Dive into this e-guide to learn how to create an effective email phishing test in 7 steps.

  • 6 Customer Service Channels You Need to Support

    Sponsored by: Freshworks

    Inside this e-guide, you'll uncover the importance of economic supply and demand and an overview of the pros and cons of 6 customer service channels to improve customer experience.

Browse by Report Type: Email White Papers | Email Multimedia | Email IT Downloads

See more topics related to: Email

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.