e-Mail Spoofing Reports

MicroScope – November 2020: Simplify the path to partner programmes
sponsored by MicroScope
EZINE: In this issue, discover how to navigate the complexity of channel partner programmes to best foster relationships, how business intelligence software is helping companies look beyond Covid-19, and why leaders are looking forward to 2021
Posted: 08 Feb 2021 | Published: 06 Nov 2020

MicroScope

What Can You Do Differently to Guard Against Threats from Rapidly Evolving Mobile Malware?
sponsored by IBM
WHITE PAPER: Mobile security is about more than the device: It's also about protecting apps on the device. Learn how IBM can help.
Posted: 09 Oct 2014 | Published: 31 Jan 2014

IBM

The Custom Defense - Your Answer to APTs
sponsored by Trend Micro
VIDEO: Explore an innovative new technology available to help your organization combat potentially disastrous advanced persistent threats (APTs).
Posted: 17 Apr 2013 | Premiered: 17 Apr 2013

Trend Micro

Phishing: The Latest Tactics And Potential Business Impacts
sponsored by Symantec
WHITE PAPER: This informative guide takes an in-depth look at phishing and how it has become an effective tactic for cybercriminals.
Posted: 14 May 2014 | Published: 14 May 2014

Symantec

Types of DNS Attacks Reveal DNS Defense Tactics
sponsored by TechTarget Security
EGUIDE: This E-Guide from SearchSecurity.com details different types of common domain name system (DNS) attacks, the unusual behaviors they invoke, and which defense tactics work best in the given scenario. View now to learn more!
Posted: 21 Mar 2013 | Published: 21 Mar 2013

TechTarget Security

Cisco Spam & Virus Blocker Frees Up Hours and Inboxes for Small Businesses
sponsored by Cisco Systems, Inc.
CASE STUDY: Spam email continues to be a big problem, even for small businesses. LUNAR, a product development consulting firm, had a major spam problem despite having just 50 employees. They found relief with Cisco's Spam and Virus Blocker. This case study details how LUNAR and other small businesses implemented and then benefited from this Cisco software.
Posted: 13 Feb 2009 | Published: 13 Feb 2009

Cisco Systems, Inc.

Presentation Transcript: Phishing and the Underground Economy
sponsored by MarkMonitor
PRESENTATION TRANSCRIPT: This document describes the risks of the new Underground Economy, phishing types, malware and how to combat phishing exploitation.
Posted: 06 Jan 2009 | Published: 06 Jan 2009

MarkMonitor

Five Network Security Threats and How to Protect Your Business
sponsored by Qwest Communications
WHITE PAPER: Threats abound in today’s corporate networks. Keeping your enterprise and its assets secure requires a proactive security strategy. Discover the five most costly network security threats and see how you can protect your business with a layered security approach.
Posted: 26 Aug 2010 | Published: 25 Aug 2010

Qwest Communications

"Hacking as a Service," and Other Emerging Threats
sponsored by TechTarget Security
EZINE: Lethal threats to enterprise security are emerging from every which way. Access this exclusive edition of Information Security Magazine to learn just what you're up against.
Posted: 12 Oct 2015 | Published: 12 Oct 2015

TechTarget Security

TechTalk: Stop Malware at the Web Gateway
sponsored by BlueCoat
WEBCAST: Safeguarding your data from malware and other Web threats takes a layered approach. In this TechTalk webinar Blue Coat Technical Marketing Engineers will lead a discussion on how the Blue Coat ProxyAV works with the ProxySG to create a community-watch based security.
Posted: 14 May 2009 | Premiered: Mar 24, 2009

BlueCoat