ComputerWeekly.com Research Library

Powered by Bitpipe.com

Phishing Research

  • Cisco Cloud Mailbox Defense

    Sponsored by: Cisco Umbrella

    Your Office 365 migration is paying off, but you have new questions and challenges about how best to secure your new cloud environment. Are you adequately protected from threats without controlling your internal mail? Leverage this data sheet to learn how Cisco’s Cloud Mailbox Defense strives to keep your cloud mailboxes safe.

  • Cybereason Video 2 – Live Attack Simulation

    Sponsored by: Cybereason

    Today’s attackers can carry out a persistent, stealthy network compromise. How does this happen, and what can you do to stop it? Access this webinar to get an interactive look at how today’s multi-stage attack campaigns operate and why a behavioral approach to detection is essential to stopping SUNBURST and broader malicious operations.

  • TRU Cyber Tales: Stopping Phishing Attacks Dead in their Tracks

    Sponsored by: eSentire

    Download this on-demand webinar to learn what eSentire’s Threat Response Unit (TRU) team is doing to stop phishing attacks dead in their tracks. Get real-world examples of phishing attacks contained by their Security Operations Center (SOC) and discuss how organizations can better protect themselves from phishing attacks in the future.

  • How to address Phishing, Business Email Compromise, Account Takeovers & More

    Sponsored by: Trustwave

    The traditional notion of a perimeter is almost non-existent. Instead, today’s cybercriminals are targeting organizations where the people, and data, exist. Read this Osterman Research paper to discover today’s most demanding cyberthreats and the best practices required to defend against them.

  • 2020 Remote Workforce Security Report

    Sponsored by: Okta

    Enabling and securing a remote work posed significant challenges to the IT teams responsible. This research report highlights those specific challenges – from internal operational hurdles to external threats – as well as impacts that went beyond security. Read on to unlock the full report.

  • Email Risk Assessment Report

    Sponsored by: 365iTMS

    Email security is much talked about right now, and it’s important that you’re up to date on the scale at which it’s under attack, the most popular types of malware bad actors are using and the vulnerability of email in general. Access the Email Risk Assessment Report to understand these trends and to pick up 7 recommendations on email safety.

  • Into the Era of Secure Remote Work

    Sponsored by: IT Corporation

    The decentralization of the workplace makes endpoint security more critical than ever. And the new tactics used by hackers and cybercriminals require focus on different tools and solutions, not least when it comes to the cloud. What strategies can you employ to remain resilient? Dive into this e-book and grab security by the horns.

  • Rules to Stop the 8 Types of Transfer Fraud Losses

    Sponsored by: Feedzai

    Fraud prevention is, by design, a broad term that encompasses any and all efforts to thwart the 8 types of transfer fraud loss. This infographic defines each of these fraud subtypes and offers insight into creating a set of rules for preventing each of them (with examples) – read on to get started.

  • Work from Home Securely by Following these Simple Tips

    Sponsored by: Zivver

    Businesses are still getting used to remote employees, and as such, security concerns are still being raised. But these remote employees can help ease some of these concerns by being more mindful about IT security. Study this article to learn 8 security tips for keeping your work-from-home environment on lockdown.

  • Why are Acronis Cyber Protection Solutions Threat-Agnostic?

    Sponsored by: Acronis

    Security professionals must both account for the many types of cyberattacks and apply security controls to different vectors through which these attacks can make their way in. In this white paper, read up on threat vectors, cyberattack techniques, types of malware and fileless attacks, and see how Acronis can help you fight them all.

  • Inky 2020 End of Year Phishing Report

    Sponsored by: Inky Technology

    With most people working remote in 2020, reliance on email for communication grew even higher – leading to a stark rise in phishing attacks. This report reflects on the top threat types and security strategies for phishing in 2020 and offers insight into what to expect in 2021 – read on to unlock the full report.

  • Phishing: Not Just One Kind of Attack

    Sponsored by: Atakama

    Phishing attacks utilize a wide range of ever-evolving techniques to steal data, from impersonating executives to targeting and duping unsuspecting employees. How can you better understand these scams? This article breaks down common schemes, their targets and their indicators, and gives a solution from Atakama for keeping these threats at bay.

  • Small Businesses Deserve Big Protection

    Sponsored by: Cisco Umbrella

    66% of all small businesses have experienced a cyberattack. And now, the rise in SaaS apps and an increase in remote workers has forced these businesses to address their increasingly outdated infrastructure. How can your small business survive evolving threats? Take a look at this e-book to see where you can make a change.

  • Stimulus Phishing Report: The Newest Wave of Pandemic Phishing Attacks

    Sponsored by: Inky Technology

    Phishing attacks have always been one of the most prominent and pervasive cyberthreats facing organizations – but the 2020 pandemic gave rise to a new wave of phishing tactics and entry points. Read this report for a closer analysis (with examples) of the phishing tactics facing today’s inboxes.

  • MicroScope – December 2020: Reasons to be positive for 2021

    Sponsored by: MicroScope

    In this issue, discover why the continued digital transformation trend means 2021 is looking good for the channel. Also read how business processes can be optimised by adding artificial intelligence to the mix, and how the channel is looking at the challenge of sustainability

  • Case Study: Protecting Trusted Insiders

    Sponsored by: Dtex

    Recently, a slew of invoice-themed malicious phishing emails were found to have penetrated a customer’s network at a large energy company. What was worse? They had very limited visibility into the attack. Read this case study to learn how this organization was able to identify, understand and mitigate future targeted phishing attacks.

  • 9 Reasons Why Security Leaders Need to Re-Evaluate Email Security

    Sponsored by: Zivver

    Access this white paper for the why, what and how of the 9 challenges organizations face to adequately protect data while still using ‘normal email’.

  • MicroScope – November 2020: Simplify the path to partner programmes

    Sponsored by: MicroScope

    In this issue, discover how to navigate the complexity of channel partner programmes to best foster relationships, how business intelligence software is helping companies look beyond Covid-19, and why leaders are looking forward to 2021

  • Driving Real Behaviour Change

    Sponsored by: Proofpoint

    There are key factors that determine the success or failure of any security awareness program: timing, engagement, and knowledge of the role of data all contribute to a metrics-based plan for security awareness in an organization. But how do you get started? Dive into this detailed e-book to learn how to begin to drive changes in behavior.

  • Credential Harvesting: Virtually Hijacking Your Employee’s Credentials

    Sponsored by: Inky Technology

    Credential harvesting is an approach often used by hackers to virtually hijack your employee’s accounts simply by using their password(s). In this INKY blog post, take a closer look at how credential harvesting works and what practices your organization can implement to minimize the risk.

  • e-book: Securing Microsoft 365 Email Against Advanced Threats

    Sponsored by: Cisco

    Businesses are migrating to cloud email platforms for improved productivity, mobility, and continual access to the latest tools and features. But there’s a catch. Cloud-based email has left users and devices open to new threats and vulnerabilities. Read this e-book to explore these risks, particularly in the context of Microsoft 365.

  • Webroot Threat Report

    Sponsored by: ColorTokens

    Each year, Webroot releases a threat report highlighting a look back at trending threats, successful security tactics, and more. Download this year’s report for a closer look into: malware, ransomware, phishing, high-risk URLs, malicious IP addresses, security awareness training & more.

  • Are Your Remote Workers Sitting Ducks?

    Sponsored by: Mimecast

    COVID-19 has resulted in working from home becoming common practice– and it could stay that way for the foreseeable future. But are remote workers sitting ducks for cyberattacks? A new Mimecast-iTnews survey of Australian organizations suggests that many are just that. Download this white paper to learn more.

  • Cloud Email Needs Cloud Security

    Sponsored by: Cisco

    90% of breaches occur via email, and in today’s cloud-centric world, built-in email security may not be enough. In order to secure Microsoft 365 from threats inside and outside of your mailbox, businesses need to consider email security that’s built for the cloud. View this infographic to learn more and to discover another security opportunity.

  • Hidden Text and Zero Font Attacks

    Sponsored by: Inky Technology

    You may have heard that some phishing emails use something called zero font — text hidden in an email by various means. It is a brand forgery email intended to harvest login credentials. But what exactly is this technique, and why do attackers use it? Read this document to learn both the why and the how of hidden text and zero font.

Browse by Report Type: Phishing White Papers | Phishing Multimedia | Phishing IT Downloads

See more topics related to: Phishing

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2021 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.