|Email threats have evolved from the basic mass-mailing viruses and worms of yesteryear into the advanced image-based phishing and rootkit attacks that are wreaking havoc in today's enterprise environment. Learn why these threats go far beyond the traditional problems that administrators and security managers have faced in the past, and how best to align messaging defenses to meet tomorrow's challenges.||MAIN MENU|
|Messaging Security School home|
|Managing traffic: Keeping your content where it belongs|
|The changing threat of email attacks|
|Defending mobile devices from viruses and spyware|
|Essential practices for securing mobile devices|
|Secure instant messaging|
|Countermeasures for malicious email code|
Download this white paper: Combating email threats
Webcast: Guarding against next-gen spam and phishing attacks
Length: 50 minutes
This webcast examines the state-of-the-art in both email attacks and defenses, and looks specifically at the technological and management requirements for facing these new attacks. The presentation addresses the use of established email security products, such as gateway antivirus, antispam and content filtering technologies, as well as newer defenses being deployed today and in the near future to combat messaging threats.
By submitting your email address, you agree to receive emails regarding relevant topic offers from TechTarget and its partners. You can withdraw your consent at any time. Contact TechTarget at 275 Grove Street, Newton, MA.
Technical tip: Reputation systems gaining credibility in fight against spam
Now that nearly all organizations employing some sort of antispam technology, spammers know their only hope for success lies with outwitting spam-detection strategies. But the emergence of reputation-based systems is making it easier to weed out spam before it ever reaches the network gateway.
Podcast: Top 5 next-generation messaging attacks that antivirus systems can't catch
Length: 15 minutes
Malicious messaging attacks -- such as embedded code in Web pages, worms in downloads, and PDFs and GIF images -- are wreaking havoc on enterprise IT systems. How do these attacks work and what can you do? In this podcast, expert Mike Rothman will count down the top five next-generation messaging attacks that antivirus can't catch, and tell you how to stop them.
Quiz: The changing threat of email attacks
A five-question multiple-choice quiz to test your understanding of the content presented in this lesson of SearchSecurity.com's Messaging Security School.
About the instructor:
Mike Rothman is president and principal analyst of Security Incite, an industry analyst firm in Atlanta, and the author of The Pragmatic CSO: 12 Steps to Being a Security Master. Rothman is also SearchSecurity.com's expert-in-residence on information security management. Get more information about the Pragmatic CSO at http://www.pragmaticcso.com, read his blog at http://blog.securityincite.com, or reach him via e-mail at mike.rothman (at) securityincite (dot) com.