Learn how 90% of verified phish were found in environments using secure email gateways (SEGs). That’s just one of the key findings in our expanded report, now covering phishing threats as well as malware developments. View the report and learn: Why and how credential phishing is still going strongWhich cloud filesharing services are being abused by … [Read more...] about Phishing threat and malware review 2019
Featured
Comment on Congress’ new cybersecurity bill
Once again the federal government is looking at ways to improve its own cybersecurity and once again the legislation is a good news/bad news effort. The good news is that members of Congress are now recognizing the importance of cybersecurity training. The bad news is that its sponsors fall short and do not understand the need for ongoing training, not just annual training … [Read more...] about Comment on Congress’ new cybersecurity bill
Uncomfortable truth #5 about phishing defense
Last in a 5-part series. In this blog series we’ve explored the Uncomfortable Truths about phishing defense that relate to the problem of over-relying on technology to keep us safe. We’ve also seen how empowered users can give Security Operations teams desperately needed visibility into phishing threats. This leads us to our fifth and final Uncomfortable Truth: … [Read more...] about Uncomfortable truth #5 about phishing defense
Reference Guide: Alternative medicine to phight phishing
Despite following training, users are still baffled and defeated by phishing hustlers. CISOs and CIOs unleash their red teams to help users recognize the pernicious attacks. … [Read more...] about Reference Guide: Alternative medicine to phight phishing
Uncomfortable truth #4 about phishing defense
Part 4 of a 5-part series. I’m not going to beat around the bush here. Uncomfortable Truth #4 is quite simple: Users are NOT the problem. There. I said it. If this statement seems at odds with your current thinking, don’t close this browser window just yet. Stick with me, and the effectiveness of your phishing defense programs could be changed for the better. … [Read more...] about Uncomfortable truth #4 about phishing defense