ComputerWeekly.com Research Library

Powered by Bitpipe.com

Phishing Research

  • CIO Insight: Why Mobile Threat Defense

    Sponsored by: Lookout

    According to a study from Lookout Inc., there was in a 37.1% increase in mobile phishing from Q4 of 2019 to Q1 of 2020. Statistics like this one solidify the need for mobile device security today. Tap into this data sheet to reveal more mobile threat stats from 2020.

  • Threat Intelligence Report: RSA Conference Edition 2020

    Sponsored by: Mimecast

    The Mimecast Threat Intelligence Report: RSA Conference Edition provides a comprehensive analysis of the key findings, trends and recommendations observed by Mimecast’s Threat Center team from October to December 2019. Download the report to discover their results – such as the rise of significant cyberattack campaigns by 145% over last quarter.

  • Reaching Beyond The Perimeter: A Deep Dive into Mimecast’s Email Security 3.0 Strategy

    Sponsored by: Mimecast

    Cybercriminals are at the peak of their powers. They’ve developed specialized tools to dig right into the hearts of businesses and leave without a trace. Email is at the center of this, with 60% of all email sent to organizations being spam or malicious. How does your organization plan to defend? Read this white paper for ideas on strategy.

  • Endpoint Security: A White Paper

    Sponsored by: Orange Business Services

    With endpoints under constant threat from phishing, malware, spyware and viruses, IT departments must consider how they are protecting their employees’ devices. Browse this white paper for a look at how to effectively monitor endpoints as well as the challenges involved in choosing, deploying and managing an endpoint monitoring capability.

  • Web Security Technical Deep Dive

    Sponsored by: Mimecast

    In this time of uncertainty, cloud and internet-based technologies are under greater threat than ever before. An influx of malware and phishing attacks means that businesses, if not properly protected, are in jeopardy. Read this technical deep dive to learn what you can do to ramp up web security.

  • Combating the Threat of Business Email Compromise

    Sponsored by: Mimecast

    According to the FBI, business email compromise (BEC) cost U.S. organizations more than $1.7 billion last year. According to Gartner, BEC phishing attacks will double every year.In this white paper, read about some of the key challenges business face when it comes to email security and how to be prepared for coming threats.

  • How to Help Prevent Increasingly Rampant Brand Exploitation

    Sponsored by: Mimecast

    A company’s reputation and trustworthiness is critical to their livelihood – which is why brand exploitation attacks present such a dangerous prospect. Download this white paper to enhance your organization’s preparedness and awareness of these lures, which provides an overview of key brand exploitation challenges and solutions.

  • This Is Your Last Line of Defense. Are They Ready?

    Sponsored by: Mimecast

    Your employees are your last line of defense against security threats. Are they ready? In this infographic, learn how to increase your employees’ knowledge of basic security issues with Mimecast Awareness Training.

  • 3 Indicators to Monitor for Business Email Compromise (BEC)

    Sponsored by: CI Security

    Since March 2020, cybercriminals have been exploiting email inboxes at an unprecedented rate with 19-related phishing attacks and business email compromise (BEC) scams. This white paper identifies the 3 most common indicators of a BEC attack, the FBI’s list of BEC red flags, and best practices for lowering your risk.

  • Why Does Cybersecurity Training Fail?

    Sponsored by: Mimecast

    The Verizon 2018 Data Breach Investigations Report found that email attacks were the cause of 96% of data breach incidents. Despite this, 34% of employees don’t see the importance of security measures.The verdict is in: Cybersecurity training fails. Why? What can you do to fix it?Dive into this white paper to learn how to solve this major problem.

  • The State of Email Security 2020

    Sponsored by: Mimecast

    It is impossible to control who is threatening your business and why, but it is possible to know how to better defend from threats by becoming more knowledgeable about how other organizations are handling them. Find out which trends are most relevant to you. Dive into this infographic for data on threat resilience and cybersecurity preparedness.

  • 100 Days of Coronavirus (COVID-19)

    Sponsored by: Mimecast

    To better understand how the coronavirus pandemic has been (and will be) exploited by malicious users, Mimecast created this analyst report, 100 Days of Coronavirus (COVID-19), which analyzes activity across the first 100 days. Download the report to unlock the key trends and recommendations.

  • Defense in Depth: Closing the Gaps in Microsoft 365 Security

    Sponsored by: Mimecast

    While email platforms like Microsoft 365 offer native security features, their ability to address today’s email-based cyberattacks is often called into question. So, how prepared is your organization to stop these threats? Download this white paper to discover security challenges and recommendations for organizations using Microsoft 365.

  • Key Cybersecurity ‘Windows’ You Need to Close

    Sponsored by: Verizon

    Just as small businesses often don't appreciate their overall cyber risk profile, they typically don't grasp exactly how cybercriminals are breaching their data stores through malware. This article indicates exactly which measures must be taken to effectively defend from cybersecurity threats.

  • A Computer Weekly buyer's guide to Threat Management

    Sponsored by: ComputerWeekly.com

    Threat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.

  • Inspecting a Phishing Campaign using Cisco Talos

    Sponsored by: Cisco Umbrella

    Join this video demo as security experts look into a phishing campaign that was set up to phish users’ credentials by leveraging interest in the global pandemic.

  • Protecting Your Business from Cyberthreats in 2020

    Sponsored by: Barracuda

    Modern hackers have taken traditional methods of cyberattack and altered them to become more precise, more aggressive, and more dangerous. The FBI reported that business email compromise attacks cost organizations $26 billion in the past three years, and this number may be due to increase. Learn more about evolving threats in this e-book.

  • 2020 Trustwave Global Security Report

    Sponsored by: SingTel

    This annual Trustwave Global Security Report provides a comprehensive look at the methods and techniques used by cybercriminals in order to provide valuable insight into ever-changing threat landscape. Download this report for an in-depth analysis of data compromise, email threats, malware, network security and more.

  • Email Security Threat Report 2020

    Sponsored by: Darktrace

    Year after year, email remains one of the most lucrative vectors for cybercriminals, likely due to the growing limitations of traditional email security methods. Download this report for an breakdown of 4 key email threats and discover how a self-defending inbox can be implemented to stop attacks before they strike.

  • Tax Scammers: Gone Phishing This Tax Season

    Sponsored by: Farsight Security

    Each tax season, thousands of Americans are scammed out of millions of dollars. In fact, according to an FTC report, nearly 1 in 10 people were victims of imposter scams last year, amounting to roughly $667 million lost. The following white paper highlights common tax scams to watch out for (according to the IRS) and how to prepare for them.

  • The State of Email Security 2020

    Sponsored by: Mimecast

    Year after year email remains the most popular attack vector, and 2020 was no exception. In fact, 60% of organizations believe it’s inevitable they will suffer an email-born attack in the coming year. So, how can organizations defend their inboxes? Download this white paper for email security insights and guidance.

  • Using Farsight Passive DNS

    Sponsored by: Farsight Security

    For a hacker, the efficiency and ease-of-use of DNS-related phishing attacks is second to none. In fact, one Verizon study found phishing to be the #1 cause of data breaches. Download this white paper to learn more about Farsight’s Passive DNS tool, which embraces NIST’s 4-phase incident response lifecycle to help you thwart DNS-related threats.

  • The Self-Defending Inbox

    Sponsored by: AWS & DarkTrace

    Phishing, account take-overs and other email-based cyberattacks grow in their severity and frequency each year, and traditional email security methods are becoming increasingly unfit. Download this white paper for an in-depth look at the world’s first self-defending inbox, which leverages AI to protect against attacks.

  • Phishing Factories and Economies - The Real Persistent Threat

    Sponsored by: Akamai Technologies

    Sadly, criminals will always leverage current events. Akamai's expert Security Research team has noted dozens of new Coronavirus domains are being deployed each day and we expect this trend to continue. In this presentation, take a deep dive into zero-day phishing detection and how it helps to fight back and reduce the impact of these scams.

  • Remote Work Cybersecurity: Best Practices & Trends

    Sponsored by: Kaspersky Lab

    The COVID-19 pandemic has sparked an increase in malware attacks. To make matters worse, many people now find themselves working from home without any special IT awareness training to help them identify cyberattacks. In this e-guide, learn more about how to gain control of your cybersecurity during these times of uncertainty.

Browse by Report Type: Phishing White Papers | Phishing Multimedia | Phishing IT Downloads

See more topics related to: Phishing

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.