Phishing Research
-
An Introduction to Security Assertion Markup Language (SAML) & Internet Single Sign-On
Sponsored by: Ping Identity CorporationCheck out this videocast to learn about Security Assertion Markup Language (SAML): what it is, how it works, and why it's important.
-
Security Threat Report: July 2009 Update
Sponsored by: SophosBusinesses are continuing to face a challenging threat landscape. Check out this paper to learn about recent security threats related to Web 2.0, social networking sites, email, mobile devices, and Mac computers.
-
Top Benefits of Symantec Protection Suite
Sponsored by: Symantec CorporationAnti-virus is not enough to protect your organization. Symantec now offers multi-layered protection from endpoint to gateway in the new Symantec Protection Suite. Download this paper to find out 10 reasons that this new product suite is the one you can trust for your organization.
-
Online Dating: Keeping Your Members Safe from Online Scams and Predators
Sponsored by: iovation, Inc.This whitepaper will help you understand what new and innovative techniques can be used to protect the reputation of your business, keep your members in a safe and trusted environment, while keeping the fraudsters out. Device fingerprinting helps identify the bad guys so sites can eliminate their accounts from the network once and for all.
-
TechTalk: Stop Malware at the Web Gateway
Sponsored by: BlueCoatSafeguarding your data from malware and other Web threats takes a layered approach. In this TechTalk webinar Blue Coat Technical Marketing Engineers will lead a discussion on how the Blue Coat ProxyAV works with the ProxySG to create a community-watch based security.
-
Cisco Spam & Virus Blocker Frees Up Hours and Inboxes for Small Businesses
Sponsored by: Cisco Systems, Inc.Spam email continues to be a big problem, even for small businesses. LUNAR, a product development consulting firm, had a major spam problem despite having just 50 employees. They found relief with Cisco's Spam and Virus Blocker. This case study details how LUNAR and other small businesses implemented and then benefited from this Cisco software.
-
Presentation Transcript: Phishing and the Underground Economy
Sponsored by: MarkMonitorThis document describes the risks of the new Underground Economy, phishing types, malware and how to combat phishing exploitation.
-
Who Is Fighting Phishing: An Overview of the Phishing Lifecycle and the Entities Involved
Sponsored by: MarkMonitorThis white paper addresses the lifecycle of a phishing attack and how different entities--including third-party take down services and law enforcement--are involved in the process of disabling phishing sites.
-
Nationwide Foils Phishers with Markmonitor: Financial Services Giant Achieves ROI with Antiphishing Solutions in Three Months
Sponsored by: MarkMonitorNationwide Building Society, a leading financial institution, has seen a dramatic increase in phishing attacks. By using MarkMonito's AntiPhishing solutions they've been able to quickly shut down phishing sites, saving thousands of pounds per month.
-
Methods, Motivations, and Mitigation of Insider Threats
Sponsored by: VeriSign, IncThis white paper takes a closer look at the real impact of insider threats. From the motives and means, to types of insider attacks and best practices, learn more about how this complicated criminal behavior is impacting enterprise today.
-
Kaspersky Internet Security 7.0
Sponsored by: KasperskyTry this free trial download today and see how Kaspersky Internet Security 7.0 features triple threat protection that defends against identity theft, confidential data leakage and all Internet threats.
-
Global Threat Research Report: Russia
Sponsored by: VeriSign, IncThis report takes an in-depth look at the security threat the Russian Business Network (RBN) is to North American-based enterprise businesses. Learn more about their current infrastructure, its corruption, and the impact the RBN has on business today.
-
DePaul University Case Study
Sponsored by: SonicWALLIn this case study DePaul University implemented SonicWALL Aventail E-Class SSL VPN solution so that the University's administrators, staff and more than 23,000 students can now securely and remotely access internal or external applications and files.
-
A Guide to Evaluating Email Security Solutions
Sponsored by: SonicWALLE-mail threats evolve daily. Read this guide to learn the challenges of implementing an email security solution and administrative considerations to make when evaluating potential email security solutions.
-
Symantec Internet Security Threat Report
Sponsored by: Symantec CorporationThis Internet Security Threat Report details the issues related to online fraud and examines current trends in the internet security landscape. Read this paper today and learn about the future of internet attacks and what to expect in the coming years.
-
Managing Instant Messaging for Business Advantage: Phase Two - Protecting against IM Threats
Sponsored by: Symantec CorporationThis white paper provides a four phase approach for effectively managing the risks and costs associated with the corporate use of IM. Learn more about how this four phase approach can help your company establish an effective IM usage policy.