Stop tomorrow's COVID-19 phishing emails today.   Get your 60-day FREE offer!

Blog

2019 Nov 18 Does Email Security Really Matter? How to Answer This Question Derek Brink, research fellow at Aberdeen Group, concludes his guest post series on the importance of effective email security. READ MORE
Eyal Benishti 2019 Nov 8 Using AI to Fight Phishing Attacks [Podcast] Eyal Benishti and Peggy Smedley discuss the role of ethics in AI and how the technology is used to mitigate phishing attacks. READ MORE
2019 Oct 31 Email Security Isn’t Fair Research firm Aberdeen Group argues that in order to face the obstacles of today’s phishing attacks, email security must be a blend of advanced technologies and human intelligence. READ MORE
Eyal Benishti 2019 Oct 25 YARA, YARA, YARA: Why Manual Rules Don’t Cut it as Incident Response Manual incident response methods like YARA rules can’t keep up with today’s advanced phishing attacks. READ MORE Ian Baxter 2019 Oct 16 How To Mitigate Email Security Risk With Continuous Feedback Loops By analyzing and learning from actionable machine and human intelligence, email security solutions can improve their ability to predict, detect and respond to email threats in real time. READ MORE Brendon Roddas 2019 Oct 8 Email Security for the Channel in 2020 Looking ahead to 2020, modern email security for the channel is vital as threats from attackers are on the rise. READ MORE Lomy Ovadia 2019 Sep 18 Dispelling the Three Most Common Myths of Email Security Incident Response For SOC & IT security teams to effectively manage email security incident response, they must first begin by being able to separate fact from fiction. READ MORE Eyal Benishti 2019 Sep 13 What does enterprise email security look like in 2020? For the enterprise, phishing prevention in 2020 requires an email security strategy in which technologies, processes and procedures address the entire phishing picture. READ MORE 2019 Sep 4 Fight Phishing & Credential Theft with AI Preventing phishing attacks that probe inboxes & scrape Microsoft Office 365 logins to produce credential harvesting pages requires AI-powered computer vision. READ MORE