By Tristan Bishop
on October 14, 2021
Fostering channel partnerships with reputable value-added resellers (VARs) has become an important component of most cybersecurity companies go-to-market strategies. Challenged by what seems like ...
By Mordechai Worch
on September 23, 2020
In this post we will discuss the methodology and workflow of our ML team and walk through a case study of deploying a real machine learning model at scale. IRONSCALES is a cybersecurity startup that ...
By Eyal Benishti
on May 27, 2020
Combine Machine Learning With Human Intelligence To Fight Phishing Attacks Email phishing attacks pose a constant challenge to organizations and their users perhaps today more than ever. The days of ...
By Lomy Ovadia
on May 20, 2020
Stop me if you’ve heard this before: Phishing threats are constantly morphing at scale and the vast majority of businesses simply don’t have the time, money and resources to investigate each and ...
By Eyal Benishti
on March 10, 2020
If you live and breathe info security, you’re undoubtedly familiar with the many sobering statistics that chronicle the persistent challenges of email security and phishing attacks:
By Eyal Benishti
on October 16, 2019
Warren Buffett once famously said that cyberattacks were “the number one problem faced by mankind,” exceeding even the threats from nuclear, biological and chemical weapons.
By Lomy Ovadia
on September 18, 2019
The email security industry has become congested with manufactured trends and buzzwords, saturating the landscape with misused terminology as outdated platforms clamor to stay on top of advanced ...
By Lomy Ovadia
on February 21, 2019
There are an endless number of buzzwords currently trending throughout the cybersecurity industry. From AI and automation to machine learning, threat hunting and offensive cyber, every month a new ...
By Tristan Bishop
on January 01, 2019
Today, everything is automated. Our daily routines, our responses to simple questions such as “how was your day,” the train you take to get to work, the sell price for stocks – all automated. But ...
By Eyal Benishti
on November 19, 2018
When it comes to beating a phishing attack, organizations are not only trying to beat the malicious message itself; they are also trying to beat time. That’s because the median time to click on ...
Shapes-Left

Join thousands of your peers! Subscribe to our blog.

Ironscales needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at any time. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, please review our Privacy Policy.

Shapes-Right