By Tyler Swinehart
on September 20, 2022
URL Rewriting, a service used to sandbox and defang malicious URLs by sending users to a portal that displays the URL in the sandboxed environment, has many well-known weaknesses and a few that may ...
By Jeff Rezabek
on August 26, 2022
When it comes to email security, no amount of technology can completely stop the threat of phishing attacks. As the threat landscape evolves and cybercriminals identify new methods to breakthrough ...
By Eyal Benishti
on December 07, 2021
I am excited to announce our Series C investment of $64M, led by PSG, a leading growth equity firm partnering with software and technology-enabled service companies, with participation from existing ...
By Eyal Benishti
on October 13, 2021
Google’s Gmail for Business has had an overhaul and now claims to offer AI-powered security features. According to its marketing materials, it will now offer advanced protection against phishing and ...
By Eyal Benishti
on March 11, 2021
In this email security blog series, we’ve examined the most common phishing tactics (Part 3), the techniques most commonly leveraged by threat actors (Part 2), and the many puzzle pieces found in ...
By Eyal Benishti
on December 15, 2020
A few years ago, I wrote in Dark Reading around the limitations of phishing education. What I was trying to emphasize in the article was that employees can be an organization’s weakest link - or its ...
By Eyal Benishti
on March 10, 2020
If you live and breathe info security, you’re undoubtedly familiar with the many sobering statistics that chronicle the persistent challenges of email security and phishing attacks:
By Lomy Ovadia
on September 18, 2019
The email security industry has become congested with manufactured trends and buzzwords, saturating the landscape with misused terminology as outdated platforms clamor to stay on top of advanced ...
By Eyal Benishti
on August 05, 2019
In the 2000s, Microsoft’s Encarta was far superior to Wikipedia in its accuracy and coverage of a vast array of topics. But that initial advantage didn’t last. Built on a centralized model, Encarta ...
Shapes-Left

Join thousands of your peers! Subscribe to our blog.

Ironscales needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at any time. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, please review our Privacy Policy.

Shapes-Right