Phishing Research
-
Types of DNS Attacks Reveal DNS Defense Tactics
Sponsored by: TechTarget SecurityThis E-Guide from SearchSecurity.com details different types of common domain name system (DNS) attacks, the unusual behaviors they invoke, and which defense tactics work best in the given scenario. View now to learn more!
-
E-Guide: New Malware Threats Require New Antimalware Protection Strategy
Sponsored by: TechTarget SecurityThis expert e-guide examines emerging threats and malware that are targeting smartphones, mobile apps, social media, and cloud services. Inside, discover essential strategies and best practices for mitigating these risks and ensuring enterprise security.
-
Maturing Your DLP Strategy for Today’s Threats
Sponsored by: TechTarget SecuritySocial networks have become a new avenue to cybercriminals today, using social engineering to exploit systems and data. In this expert resource, uncover how social networking is impacting data loss prevention (DLP) strategies and explore eight key questions to ask your vendor to help mature your DLP solution.
-
How to prevent phishing attacks: User awareness and training
Sponsored by: TechTarget SecurityThis expert E-Guide discusses the anatomy of a spear phishing attack as well as best practices on how to reduce the threat of spear phishing.
-
Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
Sponsored by: Core Security TechnologiesThis white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
-
Improving Enterprise Email Security: Systems and Tips
Sponsored by: AgariThis expert e-guide details systems that can help improve your email security and tips on how to keep it secure.
-
The Personalisation Challenge: Business Culture and Mobile Security
Sponsored by: Hewlett Packard EnterpriseThis exclusive white paper reveals the truth about mobility in the workforce, including the risks and rewards of bring your own device (BYOD) for businesses.
-
Symantec Intelligence Report - June 2013
Sponsored by: Symantec CorporationThis Symantec Intelligence Report outlines the latest need-to-know security information on vulnerabilities, spam, phish, malware, and data breaches.
-
Symantec Intelligence Report – May 2013
Sponsored by: Symantec CorporationKeeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future.
-
Symantec Internet Security Threat Report
Sponsored by: Symantec CorporationThis report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!
-
Phishing 2.0 - Why Phishing is back as the No.1 threat, and how Web Security can protect your company
Sponsored by: OpenText Security SolutionsThis resource takes an inside look at the new dangers posed by phishing 2.0 attacks. Read on to find an overview of the structure of these threats, learn about web security and anti-phishing capabilities your organization needs, and much more.
-
The Custom Defense - Your Answer to APTs
Sponsored by: Trend MicroExplore an innovative new technology available to help your organization combat potentially disastrous advanced persistent threats (APTs).
-
The Trouble Heading for Your Business 2013
Sponsored by: Trend MicroThis resource details the current state of targeted attacks and explores why putting an effective defensive strategy in place is so critical. View now to uncover the effects of these potentially disastrous attacks and what you can do to stay protected.
-
The Deloitte Consumer Review: A more secure customer
Sponsored by: TechTarget ComputerWeekly.comThis report from Deloitte assesses the impact of cybercrime on consumers and offers advice to businesses on how to respond.
-
Modernize Your Approach to Authentication
Sponsored by: TechTarget SecurityThis white paper can help you discover why attackers can target the token vendor to take advantage of the security of the authentication system as a whole and how you can replace the ubiquitous authenticator in your business.
-
Keeping Networks safe from Social Networking
Sponsored by: BlueCoatSocial Networking has provided attackers with an innovative way to gain information from within your corporate networks. This expert E-Guide will provide you with the information needed to keep your organization safe from the threats of social networking.
-
Presentation Transcript: How Google Tackles IT Security and What You Can Learn from It
Sponsored by: Google AppsToday's computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to incidents.
-
Death and Taxes...and Hackers
Sponsored by: ImpervaView this video to learn about a tax scheme that is sweeping through the internet, and how to avoid falling victim to it.
-
Mail Security for Microsoft Exchange Server
Sponsored by: ESETESET Mail Security for Microsoft Exchange Server blocks all types of email-borne malware and spam. It scans your email traffic with industry-leading precision, low system footprint and high scanning speed - so slowdowns will be a thing of the past
-
Presentation Transcript: How Google Tackles IT Security and What You Can Learn from It
Sponsored by: Google AppsToday's computing environment demands IT attention to a wide range of security issues. Learn from security practitioners at Google who are on the frontlines of fighting spam, malware and phishing for Google Apps users, securing identity management in hosted web apps and monitoring the network, detecting intrusion and responding to incidents.
-
IT@Intel Brief: Enterprise Security Benefits of Microsoft Windows 7
Sponsored by: IntelRead this solution brief to learn how Microsoft Windows 7 provides enterprise information security and protects against malware and phishing. This paper discusses all the key features.
-
Five Network Security Threats and How to Protect Your Business
Sponsored by: Qwest CommunicationsThreats abound in today’s corporate networks. Keeping your enterprise and its assets secure requires a proactive security strategy. Discover the five most costly network security threats and see how you can protect your business with a layered security approach.
-
First Annual Cost of Cyber Crime Study: Benchmark Study of U.S. Companies
Sponsored by: ArcSight, an HP CompanyThe purpose of this benchmark study is twofold. First, we wanted to quantify the economic impact of a cyber attack. Second, we believed a better understanding of the cost of cyber crime will assist organizations in determining the appropriate amount of investment and resources needed to prevent or mitigate the devastating consequences of an attack.
-
Threatsaurus: The A-Z of Computer and Data Security Threats
Sponsored by: Sophos UKWhether you're an IT professional, use a computer at work, or just browse the internet, this book is for you. We tell you the facts about the threats to your computers and to your data in simple, easy-to-understand language.
-
Information Security Magazine November 2009: Stay in Control
Sponsored by: Information Security MagazineUnmanaged changes to IT systems and networks can recklessly increase risk to enterprises. The key is rolling out an accepted change management process, and sticking to it. Read this magazine and find out how a consistent change management process puts you in charge.