ComputerWeekly.com Research Library

Powered by Bitpipe.com

Spam Research

  • Spear-phishing Analysis with ThreatQ Investigations

    Sponsored by: ThreatQuotient

    Spear-phishing attacks are a growing security threat to organizations and their employees. These attacks target victims from a seemingly reliable source to lure them to a malware-ridden site. View this webinar to learn how to develop your spear-phishing investigation skills to spot an and attack before it becomes troublesome.

  • About to Buy Guide: Spam/virus protection for Exchange

    Sponsored by: SearchSecurity.com

    This expert e-guide explores the value of a comprehensive email security strategy, and compares the pros and cons of various approaches. Discover how you can gain the antispam and antivirus protection you need to keep email threats at bay and productivity high.

  • Threat Management: Devising a new strategy to tackle today's cyberattacks

    Sponsored by: SearchSecurity.com

    This Information Security Essential Guide on Threat Management explores the new strategies organizations are developing to tackle the threat of today’s growing malware threats and targeted attacks.

  • Enterprise Device Management: A Brave New World

    Sponsored by: SearchSecurity.com

    Learn how implementing a strong mobile device management solution can help you avoid security risks and compliance violations while allowing access by your users personal devices.

  • The Bot Threat

    Sponsored by: Hewlett Packard Enterprise

    In this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defense-in-depth security system to prevent these attacks from compromising your networks.

  • The Evolution of Application Vulnerabilities, Spam Threats, and Incident Response

    Sponsored by: IBM

    This report details the many breaches and security incidents that have plagued organizations in recent years; threats from past years that are currently showing signs of resurgence; and issues to be aware of in today's security landscape.

  • The Bot Threat

    Sponsored by: Hewlett-Packard Enterprise

    In this white paper, get vital information about the malicious bot, also known as botnets when in large forces, and explore 4 key features that will help you build a defence-in-depth security system to prevent these attacks from compromising your networks.

  • Mitigating Email Virus Attacks

    Sponsored by: Cisco

    Access this resource to explore the emerging e-mail threat landscape that includes inbound and outbound risks. Read on to discover a simplified management solution that boosts defenses at a lower TCO.

  • IBM X-Force 2013 Mid-Year Trend and Risk Report

    Sponsored by: IBM

    In this detailed white paper, explore this year's report on the latest risks and security challenges organizations are facing today, and offers best practices to boost security fundamentals and policies to meet these advanced persistent threats (APTs).

  • Symantec Intelligence Report - August 2013

    Sponsored by: Symantec Corporation

    In this white paper, get the most recent analysis on cybersecurity threats and trends, and gain insight on what to expect in the future.

  • Symantec Intelligence Report - June 2013

    Sponsored by: Symantec Corporation

    This Symantec Intelligence Report outlines the latest need-to-know security information on vulnerabilities, spam, phish, malware, and data breaches.

  • Symantec Intelligence Report – May 2013

    Sponsored by: Symantec Corporation

    Keeping on top of the latest security happenings is crucial to protecting your organization. In this recent edition of Symantec's Intelligence Report, view a number of statistics and up-to-date material on the current threat landscape to learn what you should expect both now and in the future.

  • Symantec Internet Security Threat Report

    Sponsored by: Symantec Corporation

    This report reveals the latest information about today's top security vulnerabilities and threats – from targeted attacks and exploits to spam and phishing – to help you keep your organization safe. View now to learn more!

  • GlobalSign Malware Monitoring: Protecting your website from distributing hidden malware

    Sponsored by: GlobalSign

    This paper gives you a solution to keeping your websites safe, protecting your customers and securing the reputation of your company.

  • Death and Taxes...and Hackers

    Sponsored by: Imperva

    View this video to learn about a tax scheme that is sweeping through the internet, and how to avoid falling victim to it.

  • Mail Security for Microsoft Exchange Server

    Sponsored by: ESET

    ESET Mail Security for Microsoft Exchange Server blocks all types of email-borne malware and spam. It scans your email traffic with industry-leading precision, low system footprint and high scanning speed - so slowdowns will be a thing of the past

  • Fortune 200 Firm Achieves Global Email Protection

    Sponsored by: WatchGuard Technologies, Inc.

    Eaton Corporation, a premier industrial manufacturer, is an industry leader in diversified power management and ranks in the Fortune 200.

  • Sophos Security Threat Report 2011

    Sponsored by: Sophos

    Let our new 2011 Security Threat Report be your weapon in the battle against malware. It describes the significant threats of 2010, what to watch for in 2011, and more importantly, what you need to do to get ahead of them.

  • E-Guide: Enterprise UTM Security: The Best Threat Management Solution?

    Sponsored by: NETGEAR Inc.

    If you believe everything you read, enterprise unified threat management (UTM) products and appliances are the silver bullet for information security. However, I've never met a security professional who believes everything they read. UTM provides decent network security for small to midsized businesses, but probably has no place in the enterprise.

  • Presentation Transcript: Rogue Security Software - An In-Depth Look And The Challenges For Business

    Sponsored by: Sunbelt Software

    In this presentation transcript, Chris Boyd, GFI Software’s Senior Threat Researcher, provides an in-depth look into Rogue antivirus. He details the damage it can cause and how they have been tailored to look like legitimate products. You will also learn what businesses can do to better protect their network and end users from these threats.

  • Exchange Insider E-Zine - Volume 5: When Disaster Strikes in Exchange Server 2010

    Sponsored by: Google

    Volume 5 of the Exchange Insider e-zine looks at how Exchange Server 2010’s database availability groups can ease an administrator’s backup and disaster recovery stress. Also learn how Forefront Protection 2010 can help defend Exchange 2010 servers from spam and malware attacks, and best practices for email archiving and e-discovery.

  • Slipping Through The Cracks Of Web Services To Serve Malware

    Sponsored by: Trend Micro, Inc.

    Today's generation of cybercriminals continue to find more ways to abuse commonly used Web services for spamming and to spread malware. Leveraging the ever-growing number of Web 2.0 and computing platforms to facilitate operations, cybercriminals have moved away from simple and so much more.

  • Worry-Free Business Security Services

    Sponsored by: Trend Micro, Inc.

    Learn why your traditional antivirus is putting your business at risk from web threats, viruses, spam and more. Discover how Worry-Free Business Security can help.

  • E-Book: Driving Profitability through Information Security

    Sponsored by: Astaro

    While recognizing the need for security is a positive step, many of these organizations are missing an opportunity to improve their operations by using the same tools. In this document you will find some tactics you can add to your security playbook to help make your employees more productive and to help improve your organization’s efficiency.

  • McAfee Total Protection for Secure Business

    Sponsored by: Insight

    Medium-sized businesses have the dual challenges of enforcing acceptable use policies for email and the web, and ensuring compliance with government data privacy regulations. Read this white paper to learn about security solutions for your medium-sized business.

Browse by Report Type: Spam White Papers | Spam Multimedia | Spam IT Downloads

See more topics related to: Spam

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2020 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.