ComputerWeekly.com Research Library

Powered by Bitpipe.com

Phishing Research

  • Spear Phishing: Top Threats and Trends

    Sponsored by: Barracuda

    Business email compromise (BEC) is an emerging cybersecurity threat that targets user inboxes. While BEC makes up just 7% of spear-phishing attacks, it’s responsible for over $26 billion in losses in the last four years. In this report, explore the latest BEC tactics used by scammers and best practices for protecting your organization.

  • 2020 Cyberthreat Defense Report

    Sponsored by: Gigamon

    The CyberEdge Group’s annual Cyberthreat Defense Report provides an insider look at the diverse threats plaguing organizations and the strategic approaches IT and security teams are taking to mitigate these threats. A snapshot of the key findings from this year’s report can be found in the following executive brief.

  • How to Combat Spear Phishing

    Sponsored by: VMware International Unlimited Company

    Learn what spear phishing is, how it works, and find an example of how VMware Carbon Black’s cloud-native endpoint protection platform (EPP) constantly monitors and records what is happening on your endpoints—offering total visibility into malicious activities.

  • 13 Email Threat Types to Know about Right Now

    Sponsored by: Barracuda

    As email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.

  • Evolution of Email Security

    Sponsored by: Barracuda

    Ever since it became a critical tool for business communications, email has been the target of increasingly sophisticated cyberattacks. In this webinar, join Barracuda security experts as they overview the evolution of email security from early inbox threats to campaigns taking advantage of the current pandemic.

  • Barracuda Forensics and Incident Response

    Sponsored by: Barracuda

    When it comes to email-based threats, incident response is traditionally a manual process that costs time and money. In this short video, take a closer look at the key features of Barracuda Forensics and Incident Response, which is designed to replace outdated methods with an automated, data-driven approach.

  • Five Security Priorities to Consider with a Remote Workforce

    Sponsored by: Ivanti SEA

    Network security is just one of the countless business operation areas affected by the spread of COVID-19. Email-based cyberattacks are on the rise, and networks have never been more vulnerable. In this article, discover 5 strategic recommendations for how to prioritize security in these trying times.

  • Beyond the Headlines: How is the Pandemic Really Changing Cyberattacks?

    Sponsored by: CI Security

    The spread of the Coronavirus has affected nearly every aspect of our lives, so it should come as no surprise that cyberattackers are taking full advantage. In this webinar, leverage the expertise of an industry expert as they highlight vulnerable areas hackers target most often and offer best practices for mitigating these threats.

  • Shore up your cybersecurity resilience: A guide for ANZ businesses

    Sponsored by: ComputerWeekly.com

    In this e-guide, read about the next steps in Australia's cyber security blueprint, the state of data breaches in the county and what the whole region can do to prepare for new forms of cyber threats.

  • Cloud App Security Report Infographic

    Sponsored by: Trend Micro

    Although less than 400,000 business email compromise (BEC) attacks were recorded in 2019, they accounted for half of all cybercrime losses in 2019 ($1.7 billion). Download this email security threats infographic to learn more about the prevalence of BEC attacks in 2019, as well as phishing and other malware attacks.

  • Coronavirus Credential Phishing

    Sponsored by: Armorblox

    As the spread of the Coronavirus continues to create a sense of uncertainty, cyberattackers have been pushing their efforts to capitalize on people’s doubts and fears. In this white paper, dissect an example of a credential phishing attack: what theses attacks consist of, why it got through & how it was detected.

  • Boosting Cybersecurity Immunity: Confronting Risks in Today’s Work-From-Home world

    Sponsored by: Capgemini

    The spread of COVID-19 has led to a massive and dramatic shift towards working from home and a major increase in email attacks. Learn how you can address the heightened cybersecurity risks that come with the shift towards remote workers and mobile devices.

  • Augmenting Native Office 365 Email Security to Stop Targeted Email Attacks

    Sponsored by: Armorblox

    Email remains the top communication method within and among businesses. In order to take advantage of this, cyberattackers develop targeted campaigns that focus on tricking users into clicking on malware. In this white paper, learn how to complement your existing Office 365 security features with third-party services to stop email attacks.

  • Creating a Security Culture at Your Business

    Sponsored by: TechData - Microsoft

    The most persistent threat to the security of an organization is its own employees. 2/3 of employees use the same password everywhere, and too few can recognize a genuine email from a phishing scam. In this video, learn how Microsoft may be able to address these challenges and help you form a security culture.

  • How to Protect Data with Microsoft 365 Business

    Sponsored by: TechData - Microsoft

    52% of today’s data leaks are the result of human error – from bad password practices to email scams. In order to overcome these challenges, organizations should equip employees with the knowledge and tools to better understand threats. This infographic illustrates how Microsoft 365 Business can help your organization protect its data.

  • How to Secure Your Devices with Microsoft 365 Business

    Sponsored by: TechData - Microsoft

    Breached or corrupted devices account for roughly 60% of today’s cyberattacks. Although this statistic is alarming, it allows for a clear area for IT security teams to focus their efforts. In this infographic, look at the high-level benefits of Microsoft 365 Business and see how it can help your organization secure its devices.

  • Secure Mobility for Remote Workers

    Sponsored by: Lookout Inc.

    Organizational culture is shifting to enable distributed workforces. However, there are significant challenges to consider when it comes to securing remote users and devices. In this case study, explore the key features of Lookout various services and discover if the capabilities are a good fit for your remote worker security needs.

  • Third-Party Security Controls Needed to Close Gaps in Native Email Security

    Sponsored by: Armorblox

    With the move to cloud-delivered email solutions and an expanding email threat landscape, email security is in a state of transformation and organizations are reconsidering their current email security controls. Tap into this ESG report to learn what 403 IT and security professionals have to say about their email security concerns.

  • Trends in Email Security

    Sponsored by: Armorblox

    Phishing attacks are on the rise this year and this ESG report has the numbers to prove it. Download the report to uncover email security trends for 2020 and learn how your organization can stay protected from targeted attacks such as business email compromise, account takeover, and impersonation.

  • How Microsoft 365 Business Premium Protects Your Data

    Sponsored by: TechData - Microsoft

    Monitoring your network for potential risks is a lot like managing a large dam – one small leak can lead to a catastrophic breach. In this video, explore the capabilities of Microsoft Office 365 Business Premium, and discover if this is the right email security tool for your needs.

  • Okta + Proofpoint: Phishing Security and Response

    Sponsored by: Okta

    For more than 80% of breaches caused by compromised credentials; attackers don’t need to hack in – they can just log in. So how can organizations protect against attacks like phishing? Learn more in this webinar.

  • SailPoint Identity is Security

    Sponsored by: SailPoint Technologies

    Each year, we face worse and more frequent data breaches than the last. Security methods that have worked for years are becoming ineffective against modern attacks. Watch this video and discover how identity management may be able to help address modern threats targeting people.

  • How to Survive a Bank Robbery

    Sponsored by: Splunk

    Today's organizations are plagued by a myriad of cyberthreats designed to target their sensitive data and disrupt their business operations. Is your organization prepared in the event of a cyberattack? This guide is designed to prepare you to survive the 10 most common threats. Read on to learn more.

  • DNS-Layer Protection & Secure Web Gateway Security Efficacy Test Results

    Sponsored by: Cisco Umbrella

    In 2019, AV-TEST, an independent IT security institute, was commissioned by Cisco to conduct a study comparing Cisco cloud security with similar industry-leading solutions to determine the malware protection and phishing block capabilities of all vendors. Read on to uncover the results.

  • Proofpoint Threat Response Auto-Pull

    Sponsored by: Proofpoint

    Today’s organizations are under a constant barrage of email attacks, and current detection methods are manual and labor-intensive, allowing for malicious emails to remain in inboxes. In this data sheet, discover the Proofpoint Threat Response email security platform, designed to identify and quarantine lingering malware.

Browse by Report Type: Phishing White Papers | Phishing Multimedia | Phishing IT Downloads

See more topics related to: Phishing

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.