Countermeasures for malicious email code
Today's malware continues to raise the security stakes. Enterprises are now facing numerous evolving threats like targeted and blended attacks, zero-day exploits, botnets and phishing schemes. The attacks aren't the only things evolving; so are today's product sets. In this lesson, attendees will get an overview of the email threat landscape, tips for malware protection success and guidance on the future of email attacks.
![]()
|
MAIN MENU |
Messaging Security School home | |
Spam 2.0: New threats and new strategies | |
Managing traffic: Keeping your content where it belongs | |
The changing threat of email attacks | |
Defending mobile devices from viruses, spyware and malware | |
Essential practices for securing mobile devices | |
Secure instant messaging | |
Countermeasures for malicious email code | |
Securing Microsoft Exchange |
Sponsored by MessageLabs: Gartner's Magic Quadrant for E-mail Security Boundary, 2006 |

Webcast: Top tactics to beat ever-changing email threats
Length: 50 minutes
In this webcast, Bowers offers insight on the latest messaging-borne threats and investigates the movement from pure antivirus suites to more complete antimalware offerings. His historical look at threats transitions into what's happenign today and what will happen tomorrow, enabling security pros can adjust their email security postures accordingly.
Technical tip: Strategic considerations for an integrated malware defense
Set a strong defensive posture with a look at how best to safeguard your email systems from today's malware. This technical tip provides an understanding of optical mechanisms required for defense-in-depth, whether border technologies mitigate today's attack vectors, the pros and cons of desktop/client protection and how to optimize them, plus fixes for common deployment and administrative challenges faced when implementing these technologies.
Podcast: Fact or fiction: The future of email attacks
Length: 10 minutes
What will the future hold regarding future email attacks? Will a large portion of future attacks actually be caused by governments and political groups? Should enterprises evaluate the effectiveness before or after deployment? We'll confirm or debunk a number of common beliefs about what's coming next.
Quiz: Countermeasures for malicious email code
Take this quiz to test your comprehension of the latest messaging-borne threats and how to combat them.
About the instructor:
![]() |
|
![]() |
![]() |
![]() |