Email and instant messaging threat defenses news, help and research - searchSecurity.in

Email and instant messaging threat defenses

Email Alerts

Register now to receive SearchSecurity.in-related news, tips and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • crimeware kit (attack kit)

    A crimeware kit, also called an infection, exploit or DIY attack kit, is a programming tool that allows someone who does not have any experience writing software code to create, customize and distribute malware.   

  • knowledge process outsourcing (KPO)

    Knowledge process outsourcing (KPO) is the allocation of relatively high-level tasks to an outside organization or a different group within the same organization. 

  • Malware and email authentication for financial services

    Malware and fighting phishing with email authentication are major security topics for financial services firms. In part two of this video, Paul Smocer discusses the threats and mitigation options. 

  • Next generation spam: New threats and new technologies

    This video examines the evolution of the content security gateway as it evolves beyond just blocking spam and Web filtering, emphasizing the techniques and technologies used to ensure data doesn't leave your organization. 

  • Economy fuels malware, spam

    Dave Marcus of McAfee's Avert Labs, breaks down the threat landscape and explains why spam numbers are rising and malware writers are taking advantage of the down economy. 

  • Gary McGraw on secure software development

    Gary McGraw of Cigital Inc. explains why better secure coding could help thwart future Web 2.0 attacks. He says the industry is making progress. 

About Email and instant messaging threat defenses

Harness email and instant messaging threat defenses with in-depth insights. Learn about the latest email security threats and deploy suitable threat management mechanisms. Draft email and instant messaging policies. Utilize the power of instant messaging with data security and privacy protection.