Countermeasures for malicious email code

Today's malware continues to raise the security stakes. Enterprises are now facing numerous evolving threats like targeted and blended attacks, zero-day exploits, botnets and phishing schemes. The attacks aren't the only things evolving; so are today's product sets. In this lesson, attendees will get an overview of the email threat landscape, tips for malware protection success and guidance on the future of email attacks.

Today's malware continues to raise the security stakes. Enterprises are now facing numerous evolving threats like targeted and blended attacks, zero-day exploits, botnets and phishing schemes. The attacks aren't the only things evolving; so are today's product sets. In this lesson, attendees will get an overview of the email threat landscape, tips for malware protection success and guidance on the future of email attacks.

   Webcast: Top tactics to beat ever-changing email threats
   Technical tip: Strategic considerations for an integrated malware defense
   Podcast: Fact or fiction: The future of email attacks
   Quiz: Countermeasures for malicious email code
   About the instructor

MAIN MENU
Messaging Security School home
Spam 2.0: New threats and new strategies
Managing traffic: Keeping your content where it belongs
The changing threat of email attacks
Defending mobile devices from viruses, spyware and malware
Essential practices for securing mobile devices
Secure instant messaging
Countermeasures for malicious email code
Securing Microsoft Exchange
Sponsored by MessageLabs: Gartner's Magic Quadrant for E-mail Security Boundary, 2006

Webcast: Top tactics to beat ever-changing email threats
Length: 50 minutes
In this webcast, Bowers offers insight on the latest messaging-borne threats and investigates the movement from pure antivirus suites to more complete antimalware offerings. His historical look at threats transitions into what's happenign today and what will happen tomorrow, enabling security pros can adjust their email security postures accordingly.

Technical tip: Strategic considerations for an integrated malware defense
Set a strong defensive posture with a look at how best to safeguard your email systems from today's malware. This technical tip provides an understanding of optical mechanisms required for defense-in-depth, whether border technologies mitigate today's attack vectors, the pros and cons of desktop/client protection and how to optimize them, plus fixes for common deployment and administrative challenges faced when implementing these technologies.

Podcast: Fact or fiction: The future of email attacks
Length: 10 minutes
What will the future hold regarding future email attacks? Will a large portion of future attacks actually be caused by governments and political groups? Should enterprises evaluate the effectiveness before or after deployment? We'll confirm or debunk a number of common beliefs about what's coming next.

Quiz: Countermeasures for malicious email code
Take this quiz to test your comprehension of the latest messaging-borne threats and how to combat them.

About the instructor:

Tom Bowers, who holds the CISSP, PMP and Certified Ethical Hacker certifications, is a well-known expert on the topics of data leakage prevention, global enterprise information security architecture and ethical hacking. He is also the president of the Philadelphia chapter of Infragard, the second largest chapter in the country with more than 600 members. Additionally, Bowers leads the independent think tank and industry analyst group Net4NZIX. His areas of expertise include aligning business needs with security architecture, risk assessment and project management on a global scale. Bowers is a technical editor of Information Security magazine and a regular speaker at events like Information Security Decisions.
This was first published in October 2006

Dig deeper on Malware, Viruses, Trojans and Spyware

Pro+

Features

Enjoy the benefits of Pro+ membership, learn more and join.

0 comments

Oldest 

Forgot Password?

No problem! Submit your e-mail address below. We'll send you an email containing your password.

Your password has been sent to:

-ADS BY GOOGLE

SearchCloudSecurity

SearchNetworking

SearchCIO

SearchConsumerization

SearchEnterpriseDesktop

SearchCloudComputing

ComputerWeekly

Close