ComputerWeekly.com Research Library

Powered by Bitpipe.com

Messaging Security Research

  • Webinar: BEC Attacks Are the Costliest Form of Phishing

    Sponsored by: PhishLabs

    Business Email Compromise (BEC) attacks are quickly becoming the costliest and least detectible form of phishing attacks. They occur when a scammer impersonates a trusted individual to exploit relationships via email. So, what can your organization do to prevent these attacks? Watch this webinar to find out.

  • Threat Intelligence Report November 2019

    Sponsored by: Mimecast

    Mimecast threat researchers developed key insights about the types of attacks that proliferate each quarter, as well as new attacks cropping up. In this quarter’s report, learn about the modified forms of malware being used in impersonation attacks, the channels they go through, and the proactive security measures your organization can take.

  • Moorabool Shire Council Case Study

    Sponsored by: Mimecast

    In this case study, discover how Moorabool Shire Council was able to immediately reduce the number of phishing and whaling attacks in order to reduce IT workload while maintaining security for the 250 email users within their municipality.

  • Mobile Phishing: Myths and Facts Facing Every Modern Enterprise Today

    Sponsored by: Lookout

    Traditional phishing protection methods don’t apply to mobile devices, and cyberattackers are taking exposing this vulnerability. In fact, the rate at which people are falling for phishing attacks on mobile has increased 85% annually since 2011. In this white paper, dissect the myths and facts around mobile phishing.

  • GreyEnergy: Dissecting the Malware from Maldoc to Backdoor

    Sponsored by: Nozomi Networks

    GreyEnergy uses a common infection method, phishing emails with infected documents. However, the malware's code is anything but common – it is well written, smartly put together and designed to defeat detection by cybersecurity products. In this white paper, dive into an analysis of how the malware works.

  • Key Considerations when Making the Move to Office 365

    Sponsored by: Smarsh

    In this white paper, discover key considerations firms should address to make their Office 365 migration more efficient and cost effective as well as how to deploy Office 365 while maintaining regulatory compliance.

  • Threat Report: Defending Against Today's Critical Threats

    Sponsored by: Cisco Umbrella

    When it comes to the threat landscape, it's important to take a look in the rearview mirror once in a while. Not only do you get a good look at what's behind you, but you can often spot what's coming up quick. In Cisco's 2019 Threat Report, discover 5 key threats from the last year that are predicted to appear again in the near future.

  • Natural Language Understanding (NLU): A New Way to Fight Cyberattacks

    Sponsored by: Armorblox

    In this webcast, listen as Garret Bekker from 451 Research and Anand Raghavan from Armorblox discuss the email threat landscape and how Armorblox leverages deep learning and natural language understanding to deliver more comprehensive and accurate data security.

  • Proofpoint Email Isolation

    Sponsored by: Proofpoint

    It's an ongoing struggle to protect your employees against targeted phishing attacks and credential theft. To make matters worse, attackers are quickly getting the upper hand by using malicious URLs for large-scale campaigns. In this brief, learn how Proofpoint Email Isolation can help you isolate your employees from advanced threats.

  • Armorblox NLU Platform

    Sponsored by: Armorblox

    Using natural language understanding (NLU), deep learning, analytics, automation, and distributed remediation, Armorblox can help defend your organization against business email compromise attacks, prevent data leaks, and inject integrity into your business workflows. In this solution brief, explore key features of the Armorblox NLU Platform.

  • 10 Questions to Ask About Your Office 365 Deployment

    Sponsored by: Mimecast

    Providing robust email security is a critical best practice for any organization in an era of increasingly sophisticated email-borne attacks. While Office 365 provides some native protections, there are limitations to consider. In this research report, explore key issues to consider when evaluating the email security capabilities of Office 365.

  • Mimecast Cyber Resilience For Email

    Sponsored by: Mimecast

    Listen as Joel Bedoford and Phillip Clark from Mimecast explore the current cyber resilience landscape for Australian businesses and unpack survey results from 257 IT decisions makers on the topic of Cyber Resilience for Email.

  • Titus Military Classification for NATO Security Compliance

    Sponsored by: TITUS

    In recent years, intelligence and military communities have begun to embrace the need for sharing critical information with allies. In this solution brief, learn how Titus provides a common classification and policy solution that enables information-sharing in a way that minimizes the risk of compromise.

  • This is the #1 Threat to Your Digital Properties

    Sponsored by: The Media Trust

    In the early days of the Web and e-commerce, CISOs could secure the web application code developed by internal teams. But now, the majority of a website's code relies on third-parties. In this white paper, learn what CISOs need to know in order to protect themselves and their digital properties from malicious third-party code.

  • Zero Trust Internet Is the Answer for 100% Email and Web Security

    Sponsored by: Menlo Security

    Today's products categorize Internet content as being either malicious or safe and this approach is known to fail. Internet isolation enables the Zero Trust Internet and takes the guesswork out of security by assuming that all Internet content is malicious. In this white paper, learn more about Internet Isolation and Zero Trust Internet.

  • How Internet Isolation Eliminates Threats That Evade Sandboxes

    Sponsored by: Menlo Security

    Many organizations rely on a sandbox to protect against sophisticated email or malware threats. However, attackers have now figured out how to outsmart sandboxes and design attacks that appear normal to evade detection. In this webinar, Vinay Pidathala will discuss these techniques and how to defend against them using Internet Isolation.

  • 2019 Special Phishing Report

    Sponsored by: Inky Technology

    Just a single phishing attack can cost an organization hundreds of thousands, if not millions, of dollars. In this 2019 Special Phishing Report, discover how many phishing emails still breach the leading email protection systems, and why identifying and blocking these attacks still poses such a challenge.

  • Malware: The Ubiquitous Menace

    Sponsored by: The Media Trust

    Every day seems to bring news of web-based malware attacking another popular, highly trafficked website, causing harm to visitors and tarnishing the site owner's reputation and bottom line. In this white paper, learn how IT and SOC managers can protect their customers and employees by addressing security gaps on the front-end of their website.

  • Getting Started with DMARC

    Sponsored by: Proofpoint

    Email is great for business, but unfortunately, the very things that make email so popular also make it a vector of choice for cybercriminals. However, the DMARC standard is one of the most powerful weapons to date in the fight against phishing. In this white paper, explore what DMARC is, how it works and its key benefits.

  • 2019 IT Guide: Securing Email

    Sponsored by: Inky Technology

    Email, given its external, internal, and collaborative application is uniquely susceptible to cyberattacks in the form of phishing. One way to protect your organization from a phishing attack is to implement a 2-pronged email security approach. In this white paper, learn how to implement this technique and see how INKY's Phish Fence can help.

  • The 6 Most Common Types of Phishing Attacks

    Sponsored by: Inky Technology

    Phishing attacks are on the rise and attackers are constantly evolving their tactics to trick victims. In this white paper, explore 6 of the most common types of phishing attacks.

  • Understanding Phishing Attacks: Confusable Domains

    Sponsored by: Inky Technology

    Phishing scammers are nothing if not clever. There has been a constant stream of devious innovation from attackers. One technique that attackers commonly use is confusable domains. In this white paper, learn how confusable domains work and how INKY Phish Fence can prevent confusable domain attacks at your organization.

  • Reduce the Risk of Phishing Attacks on Your Company

    Sponsored by: Inky Technology

    Every employee with an email address within your organization is a risk to your business. How those employees react to a phishing attempt can be critical to the success or destruction of your business. In this blog, learn how INKY Phish Fence can help reduce the risk of phishing attacks on your company.

  • Why Training Is Not Enough to Stop Phishing Emails

    Sponsored by: Inky Technology

    According to the FBI, phishing-based email accounted for more than $12 billion in fraud in just the last 5 years. In this blog, learn how Inky Phish Fence can help your organization prevent phishing attacks by scanning every internal and external email.

  • The State of Email Security Report 2019 Key Findings

    Sponsored by: Mimecast

    94% of organizations experienced a phishing attack in Mimecast's State of Email Security survey. In this infographic, explore more key finding from the study to gain a better understanding of organization's biggest email challenges.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.