ComputerWeekly.com Research Library

Powered by Bitpipe.com

Phishing Research

  • Top Security Playbooks for 2019

    Sponsored by: Siemplify

    The security operations center (SOC) is critical to the securing business operations by investigating and negating security incidents. Playbooks assist SOC teams by providing a sequential response process that is both repeatable & targeted at specific incidents. Download this whitepaper to discover the top security playbooks for 2019.

  • State of the Internet: Financial Services Attack Economy

    Sponsored by: Akamai Technologies

    The financial services industry is one of the most sought-after targets for attackers. Staying aware of new attack trends is imperative for financial organizations to keep their systems and customers safe. In the 2019 State of the Internet: Security Financial Services Attack Economy Report, learn how to protect against emerging threats.

  • Executive Report: Phishing by the Numbers

    Sponsored by: Inky Technology

    View this report that breaks down some of the critical phishing attack statistics for the past year and reveals the 7 most common phishing themes to watch out for in 2020.

  • Understanding Phishing: Fake Attachments

    Sponsored by: Inky Technology

    Malicious fake attachments are a trend that has security pros on the alert.So how can you spot them at first glance and before they do serious damage? This special phishing report for security pros reveals exactly how it’s done.

  • Dutch DIY Giant Shelves Email Attacks

    Sponsored by: Barracuda

    As email impersonation attacks and CEO fraud pick up momentum worldwide, Intergamma IT Manager Ruud Bronswijk knew there was an urgent need to improve the DIY company’s defenses. To discover how Intergamma ultimately bolstered their Office 365 security to thwart a variety of email-based attacks, download the case study here.

  • Sharpen your Focus on Spear Phishing Attacks in 2019

    Sponsored by: PortSys

    How can you ensure you don’t end up being skewered by a spear phishing attack? Stronger identity management with multiple factors of authentication? Biometrics? How about Context of Access? Find out the facts in this revealing overview from security pundit Michael Oldham, CEO of PortSys.

  • Tricentis Slams the Door on C-level Email Attacks Using Barracuda Sentinel

    Sponsored by: Barracuda

    Tune into this video to discover how Tricentis managed to thwart spear phishing and fraud attacks against senior staff by adding AI-powered Barracuda Sentinel to their security arsenal.

  • GreyEnergy: Dissecting the Malware from Maldoc to Backdoor

    Sponsored by: Nozomi Networks

    GreyEnergy uses a common infection method, phishing emails with infected documents. However, the malware's code is anything but common – it is well written, smartly put together and designed to defeat detection by cybersecurity products. In this white paper, dive into an analysis of how the malware works.

  • The Human Factor 2019 Report

    Sponsored by: Proofpoint

    Malware-free attacks like business email compromise (BEC) and credential phishing continue to rapidly gain momentum as threat actors consistently attack individuals and business processes rather than specific systems and software. In The Human Factor 2019 Report, examine 4 key components of the attacks businesses and individuals face every day.

  • Reduce Phishing Risk in Minutes with Umbrella and Duo

    Sponsored by: Cisco Umbrella

    Cloud applications provide scale and cost benefits over legacy on-premises solutions. But with more users going direct-to-internet, the risk increases when users bypass security controls. In this webcast, learn how Umbrella and Duo can help you reduce this risk across all of your cloud and on-premises apps with a zero-trust strategy.

  • Whitepaper: Does Office 365 Deliver the Email Security and Resilience Enterprises Need?

    Sponsored by: Mimecast

    In this white paper, learn about the native security features Office 365 delivers, as well as how to extend them for the added resilience you need to keep your communications safe.

  • Proofpoint Email Isolation

    Sponsored by: Proofpoint

    It's an ongoing struggle to protect your employees against targeted phishing attacks and credential theft. To make matters worse, attackers are quickly getting the upper hand by using malicious URLs for large-scale campaigns. In this brief, learn how Proofpoint Email Isolation can help you isolate your employees from advanced threats.

  • Enterprise Email Security, Q2 2019: The 12 Providers That Matter Most And How They Stack Up

    Sponsored by: Proofpoint

    Email is a critical business function deeply embedded in business processes. Its ubiquity makes email a platform for credential phishing attempts, malware, spam, and business email compromise. This research report suggests 3 key considerations to look for when choosing an email content security provider.

  • Defend Yourself with Risk-Based Vulnerability Management

    Sponsored by: Arctic Wolf Networks, Inc.

    In this webcast, security expert Ian Hassard, Director of Product Management at Arctic Wolf Networks, shares top strategies on how to protect your business against phishing and ransomware attacks with rapid detection, response and remediation.

  • 2019 Special Phishing Report

    Sponsored by: Inky Technology

    Just a single phishing attack can cost an organization hundreds of thousands, if not millions, of dollars. In this 2019 Special Phishing Report, discover how many phishing emails still breach the leading email protection systems, and why identifying and blocking these attacks still poses such a challenge.

  • Getting Started with DMARC

    Sponsored by: Proofpoint

    Email is great for business, but unfortunately, the very things that make email so popular also make it a vector of choice for cybercriminals. However, the DMARC standard is one of the most powerful weapons to date in the fight against phishing. In this white paper, explore what DMARC is, how it works and its key benefits.

  • The 6 Most Common Types of Phishing Attacks

    Sponsored by: Inky Technology

    Phishing attacks are on the rise and attackers are constantly evolving their tactics to trick victims. In this white paper, explore 6 of the most common types of phishing attacks.

  • Understanding Phishing Attacks: Confusable Domains

    Sponsored by: Inky Technology

    Phishing scammers are nothing if not clever. There has been a constant stream of devious innovation from attackers. One technique that attackers commonly use is confusable domains. In this white paper, learn how confusable domains work and how INKY Phish Fence can prevent confusable domain attacks at your organization.

  • Reduce the Risk of Phishing Attacks on Your Company

    Sponsored by: Inky Technology

    Every employee with an email address within your organization is a risk to your business. How those employees react to a phishing attempt can be critical to the success or destruction of your business. In this blog, learn how INKY Phish Fence can help reduce the risk of phishing attacks on your company.

  • Are You Getting Phishing Attacks in Outlook?

    Sponsored by: Inky Technology

    IT security and infrastructure personnel are seeing a high volume of phishing attacks every day. This is why phishing alerts and anti-phishing software are so important. However, even if your organization uses phishing alerts in Outlook, they might not be solving the problem. In this blog, learn how INKY can help solve your phishing attack problem.

  • Spear Phishing Attacks: The #1 Cyberthreat

    Sponsored by: Inky Technology

    Spear phishing is the most popular email fraud and scam method used today. In this blog, learn how a spear phishing attack works and how organizations can prevent it.

  • Security Orchestration and Automation Playbook

    Sponsored by: Rapid7

    Discover how security orchestration and automation helps teams improve their security posture and create efficiency – without sacrificing control of important security and IT processes.

  • Email Security Risk Assessment

    Sponsored by: Mimecast

    Many organizations think their current email security systems are up to the task of protecting them from phishing. Unfortunately, many of them fall short and don't keep their organizations safe. In this report, uncover research from Mimecast's study on the amount of unwanted and dangerous emails missed by incumbent email security systems.

  • Common Office 365 Email Security Issue: Phishing

    Sponsored by: Inky Technology

    Discover the common Office 365 email security attacks that have been infiltrating businesses emails.

  • How Spear Phishing Targets the C-Suite

    Sponsored by: Inky Technology

    In this resource learn about the leading tactics and costs of spear phishing, as well as anti-phishing solutions to help protect you from email phishing and malware concerns.

Browse by Report Type: Phishing White Papers | Phishing Multimedia | Phishing IT Downloads

See more topics related to: Phishing

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2019 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.