• Platform
    Spring '24 Software Release! Check out our new deep image-based detection, GWS capabilities, and more. Explore the new additions
  • Solutions
  • Learn
    New Report! Osterman Research releases their 2024 findings on Image-based/QR Code Attacks. Read the report
  • Partner
  • Pricing


Jeff Rezabek
by Jeff Rezabek
on August 09, 2023

Phishing threats are evolving faster than ever before, becoming more sophisticated and more challenging to detect by legacy systems. With threat actors leveraging AI to compose convincing phishing ...

Hila Kahana
by Hila Kahana
on July 26, 2023

In today's digital landscape, the threat of phishing attacks continues to rise, affecting organizations of all sizes. Cybercriminals are employing increasingly sophisticated methods, including the ...

Henrik Davidsson
by Henrik Davidsson
on July 21, 2023

NIS2 (Network and Information Systems Directive) is a European Union regulation that aims to enhance cybersecurity and resilience of network and information systems within critical infrastructure ...

Audian Paxson
by Audian Paxson
on July 11, 2023

Ransomware has become a persistent and costly threat in today's digital landscape, affecting organizations across various industries. In this blog post, we will explore the market landscape of ...

by Andrew Roehm
on July 10, 2023

Introduction The release of the 2023 Verizon Data Breach Investigations Report (DBIR) offers valuable insights into the current state of cyberthreats and data breaches. In this comprehensive ...

by Andrew Roehm
on June 29, 2023

We're only half-way through 2023 and it has been a breakneck year in cybersecurity. While the expected advancements of things like artificial intelligence (AI) and Zero Trust have been focal points ...

Audian Paxson
by Audian Paxson
on June 21, 2023

In the current era of remote work, organizations are grappling with a myriad of cybersecurity challenges. In our recent commissioned report by Enterprise Strategy Group (ESG), Tackling SaaS ...

Jeff Rezabek
by Jeff Rezabek
on June 09, 2023

Secure Email Gateways (SEG)s have been a staple in many organizations’ strategies to curb email phishing and spam messages from disrupting business and targeting employees. They’ve become so ...

by Andrew Roehm
on June 02, 2023

New vulnerabilities, new attacks. New technologies, new attacks. New defenses, new attacks. Keeping up with the newest attack methods is almost as hard as keeping up with ChatGPT-based apps, ...

Eyal Benishti
by Eyal Benishti
on June 02, 2023

The phishing landscape is morphing rapidly. Cybercriminals are devising various attacks leveraging new tactics and technology to evade traditional, rule-based email security solutions and static-AI ...


Subscribe to our blog:

IRONSCALES needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at any time. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, please review our Privacy Policy.