• Why IRONSCALES
  • Platform
    Spring '24 Software Release! Check out our new deep image-based detection, GWS capabilities, and more. Explore the new additions
  • Solutions
  • Learn
    New Report! Osterman Research releases their 2024 findings on Image-based/QR Code Attacks. Read the report
  • Partner
  • Pricing

IRONSCALES Blog

Jeff Rezabek
by Jeff Rezabek
on November 29, 2022

It’s well known that a good security strategy calls for layers of protection to thwart bad actors from quickly accessing sensitive data. While many organizations have a secure email gateway deployed ...

Eyal Benishti
by Eyal Benishti
on November 17, 2022

Sometimes I hear the following from security professionals when we talk about their awareness program:

Jeff Rezabek
by Jeff Rezabek
on November 17, 2022

Cybercriminals have relied on phishing emails as a gateway to gaining access to sensitive information since the beginning of email. And reports indicate that this isn’t slowing down. For threat ...

Audian Paxson
by Audian Paxson
on November 10, 2022

Earlier this year, we launched IRONSCALES™ Starter™, our free email security software solution. And since then, it has become a very popular option with IT security admins who need to deliver ...

Audian Paxson
by Audian Paxson
on November 09, 2022

Almost every business or organization is a target for account takeover (ATO) attempts. There’s a good chance that your organization is vulnerable.

IRONSCALES
by IRONSCALES
on November 08, 2022

We recently published a report named “The Business Cost of Phishing” that provides insights into the challenges faced by IT and Security teams in their fight against this highly prevalent type of ...

Eyal Benishti
by Eyal Benishti
on November 08, 2022

For good and bad, AI is now more accessible and used for things from writing articles to identifying phishing threats. For anti-phishing, AI accessibility is beneficial for building better cyber ...

David Vuijsje
by David Vuijsje
on October 27, 2022

It may be wrong to admit, but I love a good con. It is the art of deception that fascinates me the most. Watching a con artist at work is enthralling and fills me with a mix of surprise at their ...

Eyal Benishti
by Eyal Benishti
on October 19, 2022

Defense in depth is a common practice in both the physical and the cyber security realms. We create multiple layers to complement each other; each layer assumes its predecessor failed.

Eyal Benishti
by Eyal Benishti
on October 12, 2022

The Artificial Intelligence (AI) vs. Human Insights (HI) debate has been discussed a lot in the past few years. There is no doubt that AI can outperform humans in specific areas and even beat the ...

Shapes-Left

Subscribe to our blog:

IRONSCALES needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at any time. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, please review our Privacy Policy.

Shapes-Right