• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

USA | UK | CA | DE | ES | FR | IT | NL | PL | RU | SE | SG | BR
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
  • Email
  • /
  • Email Management Software
flow-image
Imperva

The State of Security within eCommerce

2020 is a year unlike any other. Among the many effects of the global pandemic is the significant increase in online retail business. Throughout the year, Imperva Research Labs monitored traffic to e-commerce sites that exceeded the peaks typically seen in the holiday shopping season. However, as the volume of online...

Published: Feb 08, 2021
View More
flow-image
Imperva

The Anatomy of Account Takeover Attacks

Bad bots are on every website with a login page. Even yours. Hackers and fraudsters use bots to validate sets of login credentials, gain access to credit card data, and sell personally identifiable information on the dark web. They also use stolen account data to transfer money, purchase goods, or spread a specific...

Published: Feb 08, 2021
View More
flow-image
Malwarebytes

2021 State of Malware Report

The story of 2020 is of the devastating COVID-19 pandemic, and of how the world adapted. The story of malware in 2020 then, is a story of how the tools and tactics of cybercrime and cybersecurity changed against a backdrop of enormous changes to ordinary life. As entire businesses switched to remote working, IT teams...

Published: Feb 24, 2021
View More
flow-image
Malwarebytes

Enduring from Home: COVID-19’s Impact on Business Security

Faced with shelter-in-place orders in their home counties and states, countless companies transitioned to entirely remote workforces. Predictably, these near-immediate transitions carried with them some setbacks. A remote workforce can become a workforce stretched thin: Communication must adapt to online models...

Published: Feb 04, 2021
View More
flow-image
Imperva

Best Practices in Buying Down Risk

Traditional approaches fall short when attempting to buy down risk in an ever-changing environment. Conflicting requirements of speed, convenience and security battle with one another as organizations seek to embrace digital transformation. This whitepaper focuses on defense-in-depth, a framework that is at the heart...

Published: Feb 08, 2021
View More
flow-image
Imperva

15 Ways Your Website is Under Attack

Web applications are the home of your business on the internet. The functionality within your website, the structure of your technology stack, and the code used to build it are under constant attack from bad actors attempting to compromise your business. Understanding these types of attacks will help you prevent fraud,...

Published: Feb 08, 2021
View More
flow-image
OpenText

OpenText Secure Mail: Email Encryption Simplified and Integrated

OpenText Secure Mail is a cloud-based secure messaging solution for encrypting, tracking, and preventing the leak and interception of confidential information. 

Published: Oct 18, 2013
View More
flow-image
Dyn

A Guide to Transactional Email

Whether we’ve realized it or not, everyone with an email account has received a transactional email, otherwise known as the alert that Bob accepted your friend request, the receipt for the days-of-the-week socks you just bought online, or even a welcome email for signing up for that new deal of the day website. ...

Published: Mar 27, 2014
View More
flow-image
Fortinet

What Today’s Retailers Need in a Security Architecture

Retail cybersecurity in the age of the omnichannel customer experience requires CIOs and vice presidents of IT to take a 30,000-foot view. Supporting multiple point-of-sale (POS) solutions, an assortment of cloud-based applications, distributed networking software, customer mobile devices, and other emerging technologies...

Published: Jan 19, 2021
View More
flow-image
IT Corporate

Addressing the Top 10 Security Issues Organizations Face

Cybersecurity must be a top-level priority for any organization and for many it is. Security should be viewed holistically and include a range of elements, including layered, technology-based solutions on-premises and in the cloud, security awareness training to help employees become a more integral part of security defenses,...

Published: Jan 31, 2019
View More
flow-image
IT Corporate

Data Science Strategy For Dummies

All the answers to your data science questions Over half of all businesses are using data science to generate insights and value from big data. How are they doing it? Data Science Strategy For Dummies answers all your questions about how to build a data science capability from scratch, starting with the “what”...

Published: Sep 26, 2019
View More
flow-image
Mimecast

How to Help Prevent Increasingly Rampant Brand Exploitation

Brands have been the unwitting victims of scams since time immemorial. Now, in the age of phishing, it’s worse than ever. Sophisticated brand exploitation lures have been used to kick off some of the world’s most devastating cyberattacks.  Many organisations think they’re helpless to do anything...

Published: Oct 26, 2020
View More
flow-image
ThinkingPhones

Unified Communications Buyer's Guide 2016

Investing in unified communications is certainly beneficial, but identifying the correct solution can be difficult. What factors determine the cloud's value? What can you do without? Most importantly—what does your business need? Thankfully, we're taking the guesswork out of it. The Unified Communication...

Published: Nov 01, 2015
View More
flow-image
Cisco

Mitigating Email Virus Attacks

Each day, over 100 billion corporate email messages are exchanged. With email at the heart of businesses, security is a top priority. Email-based threats are more organized, targeted, and dangerous than ever before and the costs of security breaches nullify any short-term savings gained from settling for basic protection....

Published: Jun 16, 2014
View More
  •  
  •  
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  •  
  •  
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Hardware
  • IT Management
  • IT Security
  • Mobile Computing
  • Network
  • Software
  • Storage
  • Telecommunications
Contact Us

info@headleymedia.com

Call +44 (0) 1932 564999

Contact Us

© Copyright 2021: Headley Media Technology Division Ltd. Company Number: 112774219

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
x