Toggle main menu visibility
FREE TRIAL
Solutions
IRONSCALES Platform
Integrations
Threat Assessment
Phishing Simulation and Training
Phishing Emulator
Advanced Threat Protection
Malware & URL Protection
Collaborative Threat Hunting
Mailbox-Level BEC Protection
SecOps
AI-Powered Phishing Incident Response
Virtual SOC Analyst (Themis)
Pricing
News & Awards
News
Awards
About
Our Story
Leadership Team
Careers
Customers
Support & Members
Resources
Free Tools
FREE Phishing URL Scanner
FREE Phishing Emulation
White Papers & Reports
Solution Briefs
Success Stories
Webinars & Videos
Blog
Partners
Partnership Program
Partner Portal
Privacy
Privacy Policy
Privacy Shield
DPA
EULA
Cookie Settings
Contact Us
© Copyright 2021 IRONSCALES
Toggle main menu visibility
Solutions
IRONSCALES Platform
Integrations
Threat Assessment
Phishing Simulation and Training
Phishing Emulator
Advanced Threat Protection
Malware & URL Protection
Mailbox-Level BEC Protection
Collaborative Threat Hunting
SecOps
AI-Powered Phishing Incident Response
Virtual SOC Analyst (Themis)
Resources
Free Tools
FREE Phishing URL Scanner
FREE Phishing Emulation
White Papers & Reports
Solution Briefs
Success Stories
Webinars & Videos
Company
About
Our Story
Leadership Team
Careers
News & Awards
News
Awards
Customers
Support & Members
Partners
Partnership Program
Partner Portal
Contact Us
Pricing
Blog
SIGN IN
FREE TRIAL
GET A Demo
Get Your Complimentary Access To
The Gartner Market Guide For Email Security >>
Blog Archive - 2017
All years
2021
2020
2019
2018
2017
2016
January
Eyal Benishti
2017 Jan 17
All in the Ransomware Family: Biggest Phishing Threats Facing Organizations
Ransomware Family. Ransomware has been the most prevalent cyber threat since 2005. However, recent events have proven that the threat is increasing significantly in both
READ MORE
February
Eyal Benishti
2017 Feb 6
Machine Learning: The Best Defense Against Email Spoofing & CEO Fraud
Hackers and cyber criminals have responded to the adoption of employee phishing awareness training, by improving the sophistication and deceptiveness of their attacks.
READ MORE
March
Eyal Benishti
2017 Mar 21
Relax: Clicking on Phishing Email Links Doesn’t Always Equal Imminent Disaster
We’ve talked over and over again about just how big of a problem phishing has become. Unfortunately, recent reports suggest that the epidemic is getting
READ MORE
Eyal Benishti
2017 Mar 2
RSA 2017: A Call for Collaboration Amid Escalating Cyber Risks
The world’s largest cybersecurity event, RSA Conference, took place earlier this month in San Francisco, bringing together top security leaders and pioneers from all over
READ MORE
April
Eyal Benishti
2017 Apr 20
Smishing Attacks: A Rising Trend in Cybercrime
Last week, a Santander Bank customer in the U.K. received a text message saying her debit card had been compromised. To resolve the issue, the
READ MORE
May
Brendon Roddas
2017 May 16
Preventing Another Ransomware Attack: What to Look for When Choosing an Email Security Provider
Over the past year, it feels like not a single day goes by without learning of a major cyberattack that originated via a phishing or
READ MORE
Eyal Benishti
2017 May 9
The $100M Email Spoofing Attack on Multinational Internet Companies Should Accelerate Adoption of Machine Learning Security
Last month, the United States Department of Justice (DOJ) announced the arrest of a Lithuanian man for allegedly stealing $100 million from two U.S.-based tech
READ MORE
June
Eyal Benishti
2017 Jun 20
Humans + Machines: The Best Defense Against Email Phishing Attacks
According to Cybersecurity Ventures, global cybersecurity spending will exceed $1 trillion cumulatively over the next five years. With the massive number of cyber defenses, strategies and services
READ MORE
July
Eyal Benishti
2017 Jul 31
Understanding the Complexities of Email Phishing and the Role of Automation in Expediting the Forensics Phase
We recently wrote about the most prominent phishing attacks so far in 2017. Such attacks have led to record-breaking ransomware payments of more than $100
READ MORE
2017 Jul 11
Devastating Phishing Attacks Dominate First Half of 2017
Last December, we proclaimed 2016 to be the year in which phishing went mainstream. Fast-forward just six months into 2017, and it already appears that
READ MORE
August
Eyal Benishti
2017 Aug 15
Understanding the Complexities of Email Phishing: The Role of Automation in Expediting the Remediation & Prevention Phase (Part II)
In our last blog post, we discussed the complexities of email phishing and the role of automation in expediting the forensics phase. In it, we
READ MORE
September
Eyal Benishti
2017 Sep 5
Understanding the Complexities of Email Phishing: The Role of Automation in Expediting the Recovery Phase (Part III)
A recent report from FireEye cites the average time from an email phishing breach to detection is 146 days globally, and a colossal 469 days
READ MORE
October
Eyal Benishti
2017 Oct 31
Email Security Insights from the Inside - Say Goodbye to Gateway & Spam solutions!
Email Security: Teams Weigh in on Email Phishing Mitigation We regularly discuss the prevalence, and pure dominance, of phishing attacks and their impact on email security and the world.
READ MORE
November
Eyal Benishti
2017 Nov 14
The Most Common Lies of Security Awareness Training Companies
We’ve written a lot this past year on employee security awareness training, including how to measure ROI; how it must work in tandem with machine learning technology
READ MORE
December
Eyal Benishti
2017 Dec 28
From Ransomware to Social Media to the Cloud: The Top 5 Phishing Challenges That Lie Ahead in 2018
By many measures, 2017 was a rough year for cybersecurity with large, brazen phishing attacks negatively impacting governments and companies around the world. Even some of the most supposedly cyber-secure organizations such as Google, Yahoo, Verizon, Virgin America and Equifax fell victim
READ MORE
Eyal Benishti
2017 Dec 6
Looking Beyond our Series A Funding: Why Our Automated Email Phishing Detection and Response is the Next Big Thing in Cybersecurity
Since introducing our approach to the market, we have helped hundreds of companies within all industries to expedite the time from attack detection to enterprise-wide remediation from days or weeks to just seconds.
READ MORE
GARTNER
MARKET GUIDE FOR
EMAIL SECURITY
DOWNLOAD THE GUIDE