• Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us

Sign Up

USA | UK | CA | DE | ES | FR | IT | NL | PL | RU | SE | SG | BR
Sign Up
main-logo
  • Home
  • Categories
  • Latest Whitepapers
  • Vendors A-Z
  • Contact Us
  • Sign Up
  • Home
  • |
  • Email
  • /
  • Email Security
flow-image
Malwarebytes

Best Practice Makes Perfect: Malware Response in The New Normal

Before Covid-19, cyber security teams already confessed to being overworked – battling simply to keep their heads above a constant tide of security alerts, across numerous tools and reports. High profile security breaches, with malware at their root, were a seemingly weekly occurrence. The financial and reputational...

Published: Jan 22, 2021
View More
flow-image
Illumio

Secure Beyond Breach

Securing the perimeter is no longer enough. The focus has shifted to ensuring your organization continues to function if and when you’re breached — and that’s what micro-segmentation is all about. This book will help you become secure beyond breach. Based on real-world scenarios and written...

Published: Jan 18, 2021
View More
flow-image
Illumio

Enable End-to-End Zero Trust To Achieve Effective Outcomes

Illumio was named a Leader in Forrester’s latest Wave report evaluating the top Zero Trust platform providers. Out of 15 vendors, Illumio received the highest scores in the three primary categories.  Zero Trust priorities have evolved in 2020 to require solutions that secure your remote workforce with an...

Published: Jan 18, 2021
View More
flow-image
Proofpoint

Driving Real Behaviour Change

Today’s most potent cyber threat isn’t a zero-day vulnerability, new malware or the latest exploit kit. It’s your own users. That’s because today’s attacks target people, not IT infrastructure. No matter what form they take, most cyber attacks need a human victim to help activate them. They...

Published: Nov 24, 2020
View More
flow-image
ESET

Rethinking endpoint and email security for the BYOD era

The attacks can and do hit organizations of all sizes and are only becoming more widespread and difficult to detect. The consumerization of IT and Bring Your Own Device (BYOD) only exacerbates the issue since companies now have many more endpoints to protect—many of which they don’t own. In a survey of...

Published: Jul 18, 2013
View More
flow-image
IT Corporate

Web Coding & Development All-in-One For Dummies

Speak the languages that power the web. With more high-paying web development jobs opening every day, people with coding and web/app building skills are having no problems finding employment. If you’re a would-be developer looking to gain the know-how to build the interfaces, databases, and other features that...

Published: Apr 20, 2020
View More
flow-image
Cisco

Mitigating Email Virus Attacks

Each day, over 100 billion corporate email messages are exchanged. With email at the heart of businesses, security is a top priority. Email-based threats are more organized, targeted, and dangerous than ever before and the costs of security breaches nullify any short-term savings gained from settling for basic protection....

Published: Jun 16, 2014
View More
flow-image
Mimecast

The Total Economic Impact Of Mimecast's Unified Email Management (UEM) Solution

Mimecast delivers a software-as-a-service (SaaS)-based enterprise email management solution that complements the client’s existing on-premises email infrastructure. It provides services including antispam, antimalware, archiving, eDiscovery, continuity, and policy management. For a more detailed overview of...

Published: May 15, 2014
View More
flow-image
IT Corporate

Keeping Your AI Under Control: A Pragmatic Guide to Identifying, Evaluating, and Quantifying Risks

Much of our daily lives intertwine with artificial intelligence. From watching movies recommended by our entertainment streaming service, to interacting with customer service chatbots, to autotagging photos of friends in our social media apps, AI plays an invisible part in enriching our lives. While AI may be seen as a...

Published: Jan 08, 2020
View More
flow-image
DocuSign

Contract Analytics: The Key to Unlocking the Business Value Within Contracts for All Stakeholders

A business’ ability to create value stems from its ability to make wise decisions based on sound knowledge of the opportunities and risks of any given scenario. Yet synthesising useful knowledge that enables value-creation decisions is a capability that eludes many businesses. What all businesses do have is data...

Published: Nov 03, 2020
View More
flow-image
Carbon Black

Advance Your Ransomware Defenses

Ransomware isn’t new. In fact, it’s 30-years-old . What IS new is ransomware’s sudden rise as a favored attack by cyber criminals . Cyber crime has become a lucrative business and, unfortunately, ransomware has become an integral attack method that many organizations are fighting a losing battle against. ...

Published: Aug 02, 2019
View More
flow-image
Proofpoint

The Definitive Email Security Strategy Guide

Email is organisations’ most essential business tool—and today’s top malware delivery vector. It has become fertile ground for the most damaging cyber threats and all kinds of fraud, the channel where cyber attackers are most likely to compromise their targets. They trick users into clicking on an...

Published: Jun 05, 2020
View More
flow-image
Mimecast

The legal and commercial risks and issues to consider when managing emails

This white paper explores the problems of email management. Discover how you can implement an email management policy that navigates the challenges of regulatory and compliance laws by reading on now.

Published: Oct 01, 2012
View More
flow-image
Adobe

Fast, flexible and compliant e-signatures for global businesses

Today, companies are digitising as quickly as possible to help deliver the experiences customers expect. Crucial to this process is adopting electronic signatures to transact business digitally and get approvals, as paper-based processes and wet-ink signatures are inefficient, expensive and time-consuming. In this...

Published: Sep 18, 2019
View More
  •  
  •  
  • 1
  • 2
  • 3
  • 4
  • 5
  • 6
  • 7
  •  
  •  
Site Map
  • Home
  • Categories
  • Vendors A-Z
  • Latest Whitepapers
  • Contact Us
  • Privacy
technology topics
  • Cloud Computing
  • Data Center
  • Desktop/Laptop OS
  • Email
  • Hardware
  • IT Management
  • IT Security
  • Mobile Computing
  • Network
  • Software
  • Storage
  • Telecommunications
Contact Us

info@headleymedia.com

Call +44 (0) 1932 564999

Contact Us

© Copyright 2021: Headley Media Technology Division Ltd. Company Number: 112774219

We use cookies to improve user experience on our website. If you continue, we'll assume you are happy for your web browser to receive all cookies from our website. See our cookies policy for more information on cookies and how to manage them
x