By Eyal Benishti
on October 16, 2019
Warren Buffett once famously said that cyberattacks were “the number one problem faced by mankind,” exceeding even the threats from nuclear, biological and chemical weapons.
By Tristan Bishop
on January 01, 2019
Today, everything is automated. Our daily routines, our responses to simple questions such as “how was your day,” the train you take to get to work, the sell price for stocks – all automated. But ...
By Eyal Benishti
on November 19, 2018
When it comes to beating a phishing attack, organizations are not only trying to beat the malicious message itself; they are also trying to beat time. That’s because the median time to click on ...
By Eyal Benishti
on May 31, 2018
With cyber risk from ransomware and business email compromise (BEC) proliferating among companies of all sizes, cybersecurity analysts must work harder than ever to create new security policies, ...
By Eyal Benishti
on September 05, 2017
A recent report from FireEye cites the average time from an email phishing breach to detection is 146 days globally, and a colossal 469 days for the EMEA region. According to the report, “At a basic ...
By Eyal Benishti
on August 15, 2017
In our last blog post, we discussed the complexities of email phishing and the role of automation in expediting the forensics phase. In it, we highlighted that, despite a phishing-informed workforce ...
By Eyal Benishti
on March 21, 2017
Phishing Links We’ve talked over and over again about just how big of a problem phishing has become. Unfortunately, recent reports suggest that the epidemic is getting even worse. In 2016 alone, the ...
By Eyal Benishti
on September 12, 2016
Imagine for a minute that you are the CISO of a financial institution. One morning, a member of your security team hastily awakens you and informs that a major ransomware attack took place overnight. ...
By Brendon Roddas
on August 23, 2016
Sophisticated cyberattacks are on the rise, and organizations of all sizes are feverishly working harder than ever to mitigate the risks. Currently, SOC (Security Operations Center) teams play an ...
Shapes-Left

Join thousands of your peers! Subscribe to our blog.

Ironscales needs the contact information you provide to us to contact you about our products and services. You may unsubscribe from these communications at any time. For information on how to unsubscribe, as well as our privacy practices and commitment to protecting your privacy, please review our Privacy Policy.

Shapes-Right