Find Your Current Email Security Gaps.   Get A FREE Scan And Detailed Report!

Blog

Eyal Benishti 2016 Dec 15 2016 in Review: The Year Phishing Went Mainstream A decade from now, people may very well look back on 2016 as the year phishing became a mainstream concern. That’s because, in just the READ MORE
Eyal Benishti 2016 Nov 21 How Machine Learning Can Stop Phishing Attacks on Critical Infrastructure What does a prominent cyber attack against a German Steel Mill; a damaging cybersecurity event against a power plant in Ukraine and an attempted ransomware READ MORE
2016 Nov 6 Phishing Attack to Blame for Clinton Campaign Email Leaks: More Proof that Human Intelligence Alone Isn’t Enough Earlier this year, John Podesta, the campaign chair for Hillary Clinton, the Democratic candidate for President of the United States, had his personal Gmail account READ MORE
Eyal Benishti 2016 Oct 31 Data Breaches: Malpractice 2.0 According to the American Board of Professional Liability Attorneys (ABPLA), “medical malpractice occurs when a hospital, doctor or other health care professional, through a negligent READ MORE Eyal Benishti 2016 Sep 26 HR/IT Convergence Essential to Financial Services Cyber security Despite unprecedented cybersecurity budgets, some of which now exceed hundreds of millions of dollars per year, financial services institutions remain atop the most targeted industry READ MORE Eyal Benishti 2016 Sep 12 The Ransomware Epidemic in Financial Services: A Timeline from Attack to Damages Ransomware Epidemic in Financial Services: A Timeline from Attack to Damages Imagine for a minute that you are the CISO of a financial institution. One READ MORE Brendon Roddas 2016 Aug 23 How Automation can Reduce the Email Phishing Burden from SOC and Security Teams The five ways in which the IRONSCALES platform helps save SOC teams time includes orchestration, intelligence sharing, incident response, mailbox scanning and two-click deployment. READ MORE 2016 Aug 9 Black Hat 2016: Affirmation that Cybersecurity Requires Automated Response Black Hat 2016: Affirmation that Cybersecurity Requires Automated Response This year’s Black Hat conference had no shortage of valuable training sessions and exciting keynote speakers. READ MORE Eyal Benishti 2016 Jul 10 How to Run Effective Email Phishing Assessment and Training Campaigns Employees Don’t Hate According to a recent study by SANS, 95% of all attacks on enterprise networks are the result of successful spear phishing. Other research by Ponemon READ MORE
Phishing Emulator™
Quickly find your current email security gaps!
2-clicks to setup
GET A FREE SCAN
Osterman Research
WHITE PAPER
Robust Email Security Requires Alignment Between Security Practitioners and Decision Makers
DOWNLOAD NOW