E Mail Security Reports

Computer Weekly - 20 April 2021: Shop and go – will Amazon's cashless 'just walk out' store work?
sponsored by TechTarget ComputerWeekly.com
EZINE: In this week's Computer Weekly, Amazon has opened its first 'just walk out' grocery store in the UK, but is it the right time to hit the high street? We examine the human and technical issues around email security. And we analyse Microsoft's $19bn purchase of voice recognition supplier Nuance. Read the issue now.
Posted: 16 Apr 2021 | Published: 20 Apr 2021

TechTarget ComputerWeekly.com

Exchange Insider E-Zine - Volume 10: Who’s Reading Your Email?
sponsored by TechTarget Security
EZINE: With more business being conducted via email and an increasing reliance on messages, concerns about mail server security, accessibility and admin privileges (or excessive privileges) are completely valid. Volume 10 of the Exchange Insider e-zine dissects two types of Exchange 2010 auditing and explains why you should use them.
Posted: 27 Jul 2011 | Published: 20 Jul 2011

TechTarget Security

How to prevent phishing attacks: User awareness and training
sponsored by TechTarget Security
EGUIDE: This expert E-Guide discusses the anatomy of a spear phishing attack as well as best practices on how to reduce the threat of spear phishing.
Posted: 26 Oct 2011 | Published: 26 Oct 2011

TechTarget Security

E-Book: Definitive Guide to Exchange 2010 Migration Chapter 4: Load Testing and Security Exchange 2010
sponsored by TechTarget Data Center
EBOOK: This chapter explains how to test Exchange 2010 with native and third-party management tools and how best to protect your investment.
Posted: 04 Oct 2011 | Published: 04 Oct 2011

TechTarget Data Center

Email Security Technical Guide
sponsored by TechTarget Security
EZINE: Check out this expert guide to learn about how to handle the onslaught of e-mail attacks that plague organizations today. Discover best practices, techniques and system options that can help you stay secure.
Posted: 05 Apr 2013 | Published: 05 Apr 2013

TechTarget Security

Cloud Content Security: Understanding SaaS data protection
sponsored by TechTarget Security
EGUIDE: This expert e-guide examines the growing trend of SaaS security, or cloud-based security services. Learn about the pros and cons of adopting SaaS security in your organization.
Posted: 30 Apr 2012 | Published: 30 Apr 2012

TechTarget Security

Could the WannaCry Decryptor Work on Other Ransomware Strains?
sponsored by Cisco Umbrella
EGUIDE: After the global outbreak of the WannaCry ransomware, researchers created decryptor tools that could save affected files. In this guide, expert Matthew Pascucci explains how the tools work and if they work on other ransomware strains.
Posted: 01 Sep 2017 | Published: 29 Aug 2017

Cisco Umbrella

Can A Subscription Ease SSL Certificate Management?
sponsored by Symantec Website Security
EGUIDE: This e-guide shows the benefits and disadvantages of HTTPS vs. SSL web encryption.
Posted: 16 Feb 2016 | Published: 10 Feb 2016

Symantec Website Security

How to add Mobile Devices to Enterprise PKI solutions
sponsored by OpenTrust
WHITE PAPER: Extending Public Key Infrastructure’s (PKI) certificate-based authentication to include mobile devices is the only way to restore the security of computing assets in the BYOD era. Read this whitepaper to learn how to add mobile devices to your Enterprise PKI solution.
Posted: 27 Jun 2013 | Published: 27 Jun 2013

OpenTrust

Securing Microsoft Exchange 2010 with VeriSign Authentication Services
sponsored by VeriSign EMEA
WHITE PAPER: This guide from VeriSign Authentication Services will help take the guesswork out of implementing SSL for Exchange 2010, making it easier than ever to get the SSL certificate you need for a successful and secure Exchange implementation, and to take advantage of powerful capabilities such as Subject Alternative Names (SANs).
Posted: 26 Oct 2011 | Published: 26 Oct 2011

VeriSign EMEA