The Ultimate Guide to Email Security
2024 edition
Overview
Well-ingrained as a business tool, the protection of email systems is essential for secure communications and the prevention of disruptions which might occur through ‘email borne’ viruses and other malware. Typical Email Security measures include antivirus, spam filtering, and encryption, protecting against unauthorised access, data loss, phishing and other potential problems.
Analyst reports
IDC MarketScape on Advanced Persistent Threat Protection
Arctic Wolf enhances platform with identity threat dete...
Last month
Gartner on Phishing
Arctic Wolf enhances identity protection with new ITDR ...
Last month
Gartner Market Guide on DLP
Trustifi partners with CyberDisti to expand AI cybersec...
Thu, 23rd May 2024
Osterman Research on Cybersecurity
High confidence yet increased breaches in QR & image ph...
Tue, 12th Mar 2024
Canalys on Partner Programmes
Check Point Software launches cybersecurity Partner Pro...
Wed, 7th Feb 2024
Expert columns
By Ashley Diffey of Ping Identity
How healthcare providers can tighten security using ide...
This month
By Chris Fisher of Vectra AI
Getting the balance right between business innovation, ...
This month
By Stephen Kho of Avast
YouTube, the backdrop of a scammer’s play
Last month
By Dakshitaa Babu of SquareX
Why data still leaks through enterprise DLP solutions
Last month
By Cradlepoint
Singapore cyber security bill amendment: Securing your ...
Last month
More expert columns
By COSBOA
Australia's biggest bank and telecom unite to protect s...
Last month
By Stephen Kho of Avast
What is MFA bombing? Apple users were targeted using th...
Last month
By Jason Whyte of Trustwave
Why strong passwords are still the first line of defenc...
Mon, 27th May 2024
By Vivienne Horsfall of Transmit Security
Converging identity management and fraud prevention for...
Mon, 27th May 2024
By Stephen Kho of Avast
There’s a whole new wave of investment scams – and they...
Thu, 23rd May 2024
By Matt Caffrey of Barracuda
Too much of a good thing? How security sprawl can weake...
Fri, 17th May 2024
Top players
You can read more from the top players Barracuda Networks, Mimecast, Proofpoint, Trustwave, and SonicWALL.
Recent news
About Spam
Kaspersky highlights the critical role of phone numbers...
3 days ago
About Firewalls
Cybercriminals exploit URL protection to mask phishing ...
5 days ago
About Bring Your Own Device
Fortinet reveals rising cyber threats targeting Paris 2...
Last week
About Software Updates
IT professionals urged to secure networks before summer...
Last week
About Scams
Most Australians targeted by online scams, study reveal...
Last week
More news
About Scams
ExpressVPN privacy advocate warns of AI scams on Prime ...
Last week
About Phishing
Kaspersky reports surge in hybrid phishing campaigns fo...
Last week
About Privacy
Kaspersky boosts mobile spam safeguards with new app fe...
Last week
About Firewalls
Criminals misuse URL protection to mask phishing attack...
Last week
About Productivity
BlueVoyant unveils new Cyber Defense Platform for enhan...
Last week
Even more news
About Security breaches
One in four Australian businesses impacted by deepfake ...
This month
About Malware
NCSC's Malware Free Network disrupts 10 million cyber t...
This month
About Software Updates
Bitdefender & Netgear report reveals major IoT vulnerab...
Last month
About Ransomware
Trustwave report highlights severe cybersecurity threat...
Last month
About Endpoint Protection
Akamai report: 42% of web traffic driven by bots, 65% m...
Last month
Job moves
Move at Mimecast
Mimecast appoints Pauline Tng as Senior Director of Cha...
Tue, 3rd Oct 2023
Move at SMX
SMX strengthens team with new CTO
Thu, 16th Feb 2023
Move at Microsoft
Hornetsecurity appoints Katja Meyer as Chief Marketing ...
Fri, 8th Apr 2022
Move at SMX
SMX strengthens partner program and appoints new CEO
Thu, 10th Mar 2022
Move at Mimecast
Mimecast takes leap into ANZ with local channel hires
Thu, 8th Mar 2018
Other guides
You can read other related guides from Cybersecurity, Breach Prevention, Phishing, Firewalls, and Malware.
Powered by