By Lomy Ovadia
on April 30, 2020
What will “normal” look like when people around the world start returning to the office? There are some examples from those areas of the world that are ahead of the United States on the curve, but it ...
By Eyal Benishti
on December 03, 2019
Many organizations are reconsidering their email security strategy as they shift from on premise email to cloud-based applications. However, while cloud email systems from Google, Microsoft and ...
By Eyal Benishti
on October 31, 2019
Recently we teamed up with research-firm Aberdeen Group to host a webinar discussing the obstacles email security currently faces as well as solutions that include a blend of advanced technology and ...
By Eyal Benishti
on August 05, 2019
In the 2000s, Microsoft’s Encarta was far superior to Wikipedia in its accuracy and coverage of a vast array of topics. But that initial advantage didn’t last. Built on a centralized model, Encarta ...
By Eyal Benishti
on June 27, 2019
I had a strong case of déjà vu while attending the recent Gartner Security and Risk Management Summit. That’s because a lot of what I heard from speakers on cybersecurity was familiar. It reflected ...
By Brendon Roddas
on June 03, 2019
Threat intelligence feeds have been used for many years by security operations center (SOC) teams and security analysts as a means to stay ahead of trending cyberattacks. In theory, the concept of ...
By Eyal Benishti
on January 24, 2019
As we’ve written about before, email security originated in the early 2000s with anti-spam filters, followed by innovations in attack signature detection, which subsequently paved the way for secure ...
By Eyal Benishti
on November 19, 2018
When it comes to beating a phishing attack, organizations are not only trying to beat the malicious message itself; they are also trying to beat time. That’s because the median time to click on ...
By Tristan Bishop
on August 15, 2018
In case you missed it, we were recently named to the “Emerging Vendor 2018: Cybersecurity Companies You Should Know” list by CRN. This recognition is not only indictive of the progress we have made ...
By Eyal Benishti
on June 19, 2018
Six months ago we wrote about how ransomware dominated 2017. Six months later, not much has changed.
Shapes-Left

Join thousands of your peers! Subscribe to our blog.

Ironscales needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at any time. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, please review our Privacy Policy.

Shapes-Right