ComputerWeekly.com Research Library

Powered by Bitpipe.com

Email Security White Papers

  • 5 Years Wannacry Anniversary – Is Wannacry Still A Threat

    Sponsored by: Integrity360

    Wannacry ransomware first gained notoriety in 2017 after a global attack that was seen in over 150 countries and in excess of 300,000 devices. Researchers believe the attack was enacted by state sponsored cyberterrorists. Read this paper to learn more about Wannacry, and whether it poses a threat to today’ enterpirses.

  • Endpoint security: Hybrid work changes the game

    Sponsored by: ComputerWeekly.com

    A scant few years ago, you could be forgiven for thinking that endpoint security was a relatively simple affair, even though it was not.  In this E-Guide, we consider some of the most pressing issues facing the hybrid workplace in terms of endpoint security.

  • 7 of the Biggest Phishing Scams of All Time

    Sponsored by: Inky Technology

    Falling for a phishing attack isn’t just annoying—for some companies, phishing attacks can cost hundreds of millions of dollars and incalculable reputational damage. Read this short blog post to learn how 7 of the biggest phishing scams of all time happened and discover some strategies you can use to make sure you don’t join that ignominious list.

  • How a Ransomware Attack Unfolds

    Sponsored by: Inky Technology

    As recent, high-profile attacks have highlighted, ransomware (often perpetrated via phishing) is a huge risk for MSPs worldwide. Access this INKY white paper to learn how phishing attacks play out, explore strategies you can use to fight them, and discover how INKY’s mathematical and behavioral models stop ransomware attacks before they happen.

  • Why INKY for Managed Services?

    Sponsored by: Inky Technology

    INKY, a cloud-based email security platform designed with MSPs in mind, offers simple but powerful protection that is easy to deploy and manage. Access this short white paper to learn what makes INKY’s security offering attractive to so many businesses.

  • Which deployment model is right for me?

    Sponsored by: Inky Technology

    While many businesses now offer API-based solutions to enhance email security, particularly aimed at phishing, these tactics aren’t always the best approach. Access this white paper to learn how inline email security differs from API-based security and discover why INKY thinks that their standard model works best for customers.

  • Computer Weekly – 27 April 2021: Justice at last in Post Office IT scandal

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, 12 years after we broke the story, victims of the Post Office IT scandal finally have their criminal convictions overturned. We take a virtual tour of a Microsoft datacentre and meet a server called 'Mega-Godzilla Beast'. And we find out how technology is transforming Nationwide Building Society. Read the issue now.

  • Computer Weekly - 20 April 2021: Shop and go – will Amazon's cashless 'just walk out' store work?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, Amazon has opened its first 'just walk out' grocery store in the UK, but is it the right time to hit the high street? We examine the human and technical issues around email security. And we analyse Microsoft's $19bn purchase of voice recognition supplier Nuance. Read the issue now.

  • Understanding Phishing: Banner Effectiveness

    Sponsored by: Inky Technology

    Putting banners in email to alert recipients to the potential dangers lurking in messages can be a highly effective way to keep employees safe from phishing attacks. But for this to be effective, you have to know which emails to flag. View this white paper to learn how INKY’s Phish Fence determines which emails to warn users about.

  • Spear Phishing: Top Threats and Trends Vol. 5

    Sponsored by: Barracuda

    As their speedy exploitation of fears around the COVID-19 pandemic show, cybercriminals adapt quickly to current events and new tactics. This in-depth report takes a look at the evolving trends in spear-phishing and the new ways attackers are tricking their victims – read on unlock this exclusive insight.

  • Leading private hospital consolidates email protection to secure VIP guests’ data “Crown Jewels”

    Sponsored by: Barracuda

    Healthcare is one of the most frequently targeted verticals and patient data has grown in value to cybercriminals. This case study follows how Richard Andrews, Head of IT at King Edward VII’s hospital in London, was able to implement email security for his most vulnerable patients – including members of the Royal Family.

  • Spear Phishing vol4: Impersonations are increasingly more common, sophisticated and targeted.

    Sponsored by: Barracuda

    Spear phishing, alongside other impersonation attacks, are on the rise, and new tactics are making it more difficult to differentiate between an impersonation attempt and a genuine message. Read on to discover the top 3 spear phishing impersonation attacks to keep an eye on.

  • Omdia Market Radar: Outbound Email Security

    Sponsored by: Zivver

    Email is a powerful instrument for sending messages anywhere, to anyone, so much so that it has become a universal tool of communication, both within and beyond the business environment. The OMDIA Market Radar provides an overview of solutions to prevent non-cyber related issues in digital communications today. Read on to learn more.

  • Are your remote workers sitting ducks?

    Sponsored by: Mimecast

    COVID-19 has resulted in working from home becoming common practice– and it could stay that way for the foreseeable future. But are remote workers sitting ducks for cyberattacks? A new Mimecast-iTnews survey of Australian organisations suggests that many are just that. Download this white paper to learn more.

  • Insights into attacker activity in compromised email accounts

    Sponsored by: Barracuda

    Spear phishing and email account takeovers are proving to be a lucrative and accessible opportunity for cybercriminals – and attack methods are only growing more sophisticated. This report provides an overview of today’s top email security threats and offers defensive best practices for protecting your inboxes.

  • Spear Phishing vol3: Top Threats and Trends: Defending against business email compromise attacks

    Sponsored by: Barracuda

    Business email compromise (BEC) is an emerging cybersecurity threat that targets user inboxes. While BEC makes up just 7% of spear-phishing attacks, it’s responsible for over $26 billion in losses in the last four years. In this report, explore the latest BEC tactics used by scammers and best practices for protecting your organization.

  • 13 email threat types to know about right now

    Sponsored by: Barracuda

    As email grows into an increasingly critical aspect of the communication infrastructure, it becomes a more attractive target to cyberattackers. This e-book overviews some key email threats to keep an eye on, and explores how to defend against them.

  • Spear Phishing vol2: Top Threats and Trends. Email account takeover, Defending against lateral phishing

    Sponsored by: Barracuda

    This report takes an in-depth look at lateral phishing tactics. Read on to gain exclusive insight into recipient targeting strategies, the 10 most common words used in lateral phishing emails, 3 ways to defend against lateral phishing, and more.

  • Who will win the world's biggest cloud contract?

    Sponsored by: ComputerWeekly.com

    In this week's Computer Weekly, we examine the $10bn Pentagon cloud contract – codenamed JEDI – and ask why it is taking so long to choose a supplier. We discuss with IT chiefs how AI will transform technology leadership. And we look at how to improve your email security. Read the issue now.

  • Agile software testing pioneer slams the door on C-level email attacks

    Sponsored by: Barracuda

    Learn how Tricentis, an automated software testing company, was able to thwart spear-phishing and fraud attacks against senior staff.

  • Best Practices for Protecting Against Phishing, Ransomware and Email Fraud

    Sponsored by: Barracuda

    Download this Osterman Research white paper to learn more about the growing success of cyber threats, the top incidents that are concerning decision makers, and 10 tactics for fending off these advanced attacks.

  • Spear Phishing: Top Threats and Trends Vol. 1

    Sponsored by: Barracuda

    This report takes an in-depth look at the three most prevalent types of spear phishing attacks—brand impersonation, business email compromise, and blackmail—and examines 8 defense strategies for preventing these attacks. Read on to learn how to put these strategies to work to protect your company.

  • Email is your go-to comms tool, so don't scrimp on securing it

    Sponsored by: ComputerWeekly.com

    In this e-guide we will explore some current trends and best practice for email security to help you ensure you're as prepared as possible for the next malicious email to hit your inbox, which it assuredly will.

  • 12 Essential Features of Advanced Endpoint Security Tools

    Sponsored by: Claranet

    Endpoint protection of enterprise systems is an efficient method of managing software deployment and enforcing IT security operations' policies. However, it does more than protect a network from malware. Download this e-guide to learn how endpoint security can be used for a number of operation monitoring functions and data backup strategies.

  • Remote Work Cybersecurity: Best Practices & Trends

    Sponsored by: Kaspersky

    The COVID-19 pandemic has sparked an increase in malware attacks. To make matters worse, many people now find themselves working from home without any special IT awareness training to help them identify cyberattacks. In this e-guide, learn more about how to gain control of your cybersecurity during these times of uncertainty.

Bitpipe Definitions: A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Other

ComputerWeekly.com Research Library Copyright © 1998-2022 Bitpipe, Inc. All Rights Reserved.

Designated trademarks and brands are the property of their respective owners.

Use of this web site constitutes acceptance of the Bitpipe Terms and Conditions and Privacy Policy.