Phishing Research
-
The state of email trust in 2014
Sponsored by: ComputerWeekly.comEmail security improved in 2014 but most companies still haven't done enough to protect their customers from phishing attacks, this study from Agari reveals.
-
Mitigations for Mobile Phishing Problems on the iOS Platform
Sponsored by: SearchSecurity.comAttackers today are commonly using SMS messaging as a form of mobile device phishing. This expert E-Guide will walk you through the basics of SMS-based attacks and what security teams can do to mitigate the risk associated with iOS devices. Read on to learn more.
-
Types of DNS Attacks Reveal DNS Defense Tactics
Sponsored by: SearchSecurity.comThis E-Guide from SearchSecurity.com details different types of common domain name system (DNS) attacks, the unusual behaviors they invoke, and which defense tactics work best in the given scenario. View now to learn more!
-
E-Guide: New Malware Threats Require New Antimalware Protection Strategy
Sponsored by: SearchSecurity.comThis expert e-guide examines emerging threats and malware that are targeting smartphones, mobile apps, social media, and cloud services. Inside, discover essential strategies and best practices for mitigating these risks and ensuring enterprise security.
-
Maturing Your DLP Strategy for Today’s Threats
Sponsored by: SearchSecurity.comSocial networks have become a new avenue to cybercriminals today, using social engineering to exploit systems and data. In this expert resource, uncover how social networking is impacting data loss prevention (DLP) strategies and explore eight key questions to ask your vendor to help mature your DLP solution.
-
Moving Beyond Ad Hoc Mobile Security
Sponsored by: SearchSecurity.comIs security the missing piece in your enterprise mobile strategy? In this issue of Information Security, we ask CISOs and other security experts about the uncertain path from basic protections to threat management and mature mobile security.
-
"Hacking as a Service," and Other Emerging Threats
Sponsored by: SearchSecurity.comLethal threats to enterprise security are emerging from every which way. Access this exclusive edition of Information Security Magazine to learn just what you're up against.
-
The Bot Threat
Sponsored by: Hewlett Packard EnterpriseIn this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defense-in-depth security system to prevent these attacks from compromising your networks.
-
What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
Sponsored by: IBMMobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
-
Malware Analysts Have the Tools to Defend Against Cyber-Attacks, But Challenges Remain
Sponsored by: Threat Track SecurityThis informative guide explores today's threat landscape, the role of malware and the threat of internal vulnerabilities.
-
Phishing: The Latest Tactics And Potential Business Impacts
Sponsored by: SymantecThis informative guide takes an in-depth look at phishing and how it has become an effective tactic for cybercriminals.
-
The Bot Threat
Sponsored by: Hewlett-Packard EnterpriseIn this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defence-in-depth security system to prevent these attacks from compromising your networks.
-
Phishing and Web Security
Sponsored by: WebrootThis brief whitepaper explores why businesses need to prepare for phishing 2.0 and why this new cybercrime is aiming its sights at your business.
-
IBM X-Force 2013 Mid-Year Trend and Risk Report
Sponsored by: IBMIn this detailed white paper, explore this year's report on the latest risks and security challenges organizations are facing today, and offers best practices to boost security fundamentals and policies to meet these advanced persistent threats (APTs).
-
Measuring End User Susceptibility and Defenses Against Phishing Attacks with CORE Insight
Sponsored by: Core Security TechnologiesThis white paper contains critical information about spear phishing and how to prepare your users and systems from falling for these targeted attacks being masked as trustworthy content.
-
Improving Enterprise Email Security: Systems and Tips
Sponsored by: AgariThis expert e-guide details systems that can help improve your email security and tips on how to keep it secure.
-
The Personalisation Challenge: Business Culture and Mobile Security
Sponsored by: Hewlett Packard EnterpriseThis exclusive white paper reveals the truth about mobility in the workforce, including the risks and rewards of bring your own device (BYOD) for businesses.
-
Symantec Intelligence Report - June 2013
Sponsored by: Symantec CorporationThis Symantec Intelligence Report outlines the latest need-to-know security information on vulnerabilities, spam, phish, malware, and data breaches.
-
Symantec Intelligence Report – May 2013
Sponsored by: Symantec CorporationKeeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future.
-
Symantec Internet Security Threat Report
Sponsored by: Symantec CorporationThis report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!
-
Phishing 2.0 - Why Phishing is back as the No.1 threat, and how Web Security can protect your company
Sponsored by: WebrootThis resource takes an inside look at the new dangers posed by phishing 2.0 attacks. Read on to find an overview of the structure of these threats, learn about web security and anti-phishing capabilities your organization needs, and much more.
-
The Custom Defense - Your Answer to APTs
Sponsored by: Trend MicroExplore an innovative new technology available to help your organization combat potentially disastrous advanced persistent threats (APTs).
-
The Trouble Heading for Your Business 2013
Sponsored by: Trend MicroThis resource details the current state of targeted attacks and explores why putting an effective defensive strategy in place is so critical. View now to uncover the effects of these potentially disastrous attacks and what you can do to stay protected.
-
The Deloitte Consumer Review: A more secure customer
Sponsored by: ComputerWeekly.comThis report from Deloitte assesses the impact of cybercrime on consumers and offers advice to businesses on how to respond.
-
Modernize Your Approach to Authentication
Sponsored by: SearchSecurity.comThis white paper can help you discover why attackers can target the token vendor to take advantage of the security of the authentication system as a whole and how you can replace the ubiquitous authenticator in your business.