By Eyal Benishti
on October 25, 2019
Back in the early days of my cybersecurity career, I worked as a malware analyst. Almost on a daily basis, I wrote and executed YARA rules to try to search and detect multiple instances of the same ...
By Lomy Ovadia
on September 18, 2019
The email security industry has become congested with manufactured trends and buzzwords, saturating the landscape with misused terminology as outdated platforms clamor to stay on top of advanced ...
By IRONSCALES
on April 11, 2019
In the days of Henry Ford, automobiles were all 5-speed manual transmissions that required drivers to push clutches and switch gears by band. Automatic transmissions then automated that part of ...
By Eyal Benishti
on January 24, 2019
As we’ve written about before, email security originated in the early 2000s with anti-spam filters, followed by innovations in attack signature detection, which subsequently paved the way for secure ...
By Eyal Benishti
on November 19, 2018
When it comes to beating a phishing attack, organizations are not only trying to beat the malicious message itself; they are also trying to beat time. That’s because the median time to click on ...
By Tristan Bishop
on August 15, 2018
In case you missed it, we were recently named to the “Emerging Vendor 2018: Cybersecurity Companies You Should Know” list by CRN. This recognition is not only indictive of the progress we have made ...
By Eyal Benishti
on June 19, 2018
Six months ago we wrote about how ransomware dominated 2017. Six months later, not much has changed.
By Eyal Benishti
on May 31, 2018
With cyber risk from ransomware and business email compromise (BEC) proliferating among companies of all sizes, cybersecurity analysts must work harder than ever to create new security policies, ...
By Eyal Benishti
on May 09, 2018
As email phishing grows more sophisticated and remains a primary attack vector for data breaches, many security providers are attempting to step up their solutions to better mitigate risk. Microsoft ...
By Eyal Benishti
on April 26, 2018
In April [2018], the UK’s National Cyber Security Centre (NCSC) published its Active Cyber Defence (ACD) Programme which urged companies to employ the Domain-based message authentication, reporting ...
Shapes-Left

Join thousands of your peers! Subscribe to our blog.

Ironscales needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at any time. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, please review our Privacy Policy.

Shapes-Right