E Mail Security Reports

Infographic: Business email compromise red flags
sponsored by TechTarget ComputerWeekly.com
INFOGRAPHIC: Business Email Compromise (BEC) attacks typically target individuals with access to financial records and other sensitive information. However, BEC prevention involves making everyone more aware of email security risks and social engineering red flags. Here are 7 things to look out for when identifying a BEC attack.
Posted: 06 Mar 2023 | Published: 07 Mar 2023

TechTarget ComputerWeekly.com

Webmail Forensics: Investigating Issues with Email Forwarding Security
sponsored by Kaspersky
EGUIDE: This expert guide will help you learn more about what it takes in order to make sure your organization has an effective forensic readiness plan ready. Read on and learn how to prepare your plan today.
Posted: 22 Apr 2013 | Published: 22 Apr 2013

Kaspersky

e-Zine: Purchasing Considerations for Exchange 2010
sponsored by Dell EMC and Microsoft
EZINE: Find out why now is the best time to migrate to Exchange 2010 in this expert e-zine. Plus, discover how to cost-effectively meet the hardware and performance demands of this latest upgrade.
Posted: 23 Apr 2012 | Published: 18 Apr 2012

Dell EMC and Microsoft

Could the WannaCry Decryptor Work on Other Ransomware Strains?
sponsored by Cisco Umbrella
EGUIDE: After the global outbreak of the WannaCry ransomware, researchers created decryptor tools that could save affected files. In this guide, expert Matthew Pascucci explains how the tools work and if they work on other ransomware strains.
Posted: 01 Sep 2017 | Published: 29 Aug 2017

Cisco Umbrella

Active Directory Forest Disaster Recovery: What You Don't Know Will Hurt You
sponsored by Dell Software
WHITE PAPER: Access this white paper to learn how to avoid the most common Active Directory disasters. Inside, examine case studies and discover strategies for handling domain controller failure, accidental bulk deletion of objects, forest failure and more.
Posted: 28 Aug 2012 | Published: 21 Aug 2012

Dell Software

What secure email gateways can do for your enterprise
sponsored by TechTarget Security
EBOOK: It is important to evaluate secure email gateways before implementing them in your organization. Here's a look at some of the best email security gateway products in the industry, as well as implementation, cost and uses.
Posted: 14 Feb 2020 | Published: 14 Feb 2020

TechTarget Security

How to Build an Enterprise Cybersecurity Plan
sponsored by Fortinet, Inc.
EGUIDE: A cybersecurity action plan is a crucial part of achieving a state of cybersecurity readiness. Inside this guide, industry expert Peter Sullivan explains what goes into these plans and how to get one started.
Posted: 26 May 2017 | Published: 26 May 2017

Fortinet, Inc.

Presentation Transcript: Mobile Strategies, Part 1: Harnessing the IT Consumerization Deluge
sponsored by Dell, Inc. and IntelĀ®
PRESENTATION TRANSCRIPT: This presentation transcript reveals key findings from a recent consumerisation poll and provides recommendations and best practices to help organisations address these key topics. Obtain predictions for the future of the media tablet market and gain insight into five trends that are shaping the consumerisation landscape.
Posted: 25 Jan 2012 | Published: 25 Jan 2012

Dell, Inc. and IntelĀ®

Email is your go-to comms tool, so don't scrimp on securing it
sponsored by TechTarget ComputerWeekly.com
EBOOK: In this e-guide we will explore some current trends and best practice for email security to help you ensure you're as prepared as possible for the next malicious email to hit your inbox, which it assuredly will.
Posted: 08 Feb 2022 | Published: 08 Feb 2022

TechTarget ComputerWeekly.com

Enterprise Email and Office 365 Security
sponsored by Check Point Software Technologies Ltd.
EGUIDE: One way to secure enterprise email is to issue digital certificates, so employees can digitally sign and encrypt their email messages. Explore more of what experts are saying about corporate information protocols that transcend topographies.
Posted: 17 Jun 2016 | Published: 07 Jun 2016

Check Point Software Technologies Ltd.