Email Spoofing Reports

A Computer Weekly buyer's guide to Threat Management
sponsored by TechTarget ComputerWeekly.com
EGUIDE: Threat management has become a vital component in the cyber security strategy of many businesses. In this19-page buyer's guide, Computer Weekly looks at why threat management should be tailored to your company's needs, the strength in combining it with other security systems and how cloud-based security can reduce costs.
Posted: 08 Feb 2021 | Published: 05 Apr 2019

TechTarget ComputerWeekly.com

Phishing Cisco Special Edition
sponsored by Cisco
EBOOK: Protecting yourself and your business from phishing attacks can be a daunting task. While it's impossible to eliminate all risk, there are steps you can take to reduce the odds and your brand. Enter "Phishing for Dummies" – the definitive guide for IT professionals seeking comprehensive knowledge and defense against phishing attacks.
Posted: 23 Feb 2024 | Published: 23 Feb 2024

TOPICS:  Phishing
Cisco

Shore up your cybersecurity resilience: A guide for ANZ businesses
sponsored by TechTarget ComputerWeekly.com
EGUIDE: In this e-guide, read about the next steps in Australia's cyber security blueprint, the state of data breaches in the county and what the whole region can do to prepare for new forms of cyber threats.
Posted: 08 Feb 2021 | Published: 20 Apr 2020

TechTarget ComputerWeekly.com

Why Businesses Need a More Enlightened Approach to Phishing Attacks
sponsored by PhishMe
EGUIDE: Discover why your enterprise needs to take phishing seriously, 6 tactics these types of attacks utilize, how to teach your employees to recognize phishing, and security measures to take after an employee clicks on a malicious link.
Posted: 19 Jun 2017 | Published: 14 Jun 2017

PhishMe

IBM X-Force 2013 Mid-Year Trend and Risk Report
sponsored by IBM
WHITE PAPER: In this detailed white paper, explore this year's report on the latest risks and security challenges organizations are facing today, and offers best practices to boost security fundamentals and policies to meet these advanced persistent threats (APTs).
Posted: 06 Nov 2013 | Published: 30 Sep 2013

IBM

Improving Enterprise Email Security: Systems and Tips
sponsored by Agari
EGUIDE: This expert e-guide details systems that can help improve your email security and tips on how to keep it secure.
Posted: 04 Oct 2013 | Published: 04 Oct 2013

Agari

The Personalisation Challenge: Business Culture and Mobile Security
sponsored by Hewlett Packard Enterprise
WHITE PAPER: This exclusive white paper reveals the truth about mobility in the workforce, including the risks and rewards of bring your own device (BYOD) for businesses.
Posted: 24 Sep 2013 | Published: 24 Sep 2013

Hewlett Packard Enterprise

E-Guide: New Malware Threats Require New Antimalware Protection Strategy
sponsored by TechTarget Security
EGUIDE: This expert e-guide examines emerging threats and malware that are targeting smartphones, mobile apps, social media, and cloud services. Inside, discover essential strategies and best practices for mitigating these risks and ensuring enterprise security.
Posted: 05 Dec 2012 | Published: 05 Dec 2012

TechTarget Security

The Deloitte Consumer Review: A more secure customer
sponsored by TechTarget ComputerWeekly.com
ESSENTIAL GUIDE: This report from Deloitte assesses the impact of cybercrime on consumers and offers advice to businesses on how to respond.
Posted: 12 Mar 2013 | Published: 12 Mar 2013

TechTarget ComputerWeekly.com

Information Security Magazine November 2009: Stay in Control
sponsored by Information Security Magazine
EZINE: Unmanaged changes to IT systems and networks can recklessly increase risk to enterprises. The key is rolling out an accepted change management process, and sticking to it. Read this magazine and find out how a consistent change management process puts you in charge.
Posted: 16 Nov 2009 | Published: 16 Nov 2009

Information Security Magazine