Toggle main menu visibility
FREE TRIAL
Solutions
IRONSCALES Platform
Integrations
Threat Assessment
Phishing Simulation and Training
Phishing Emulator
Advanced Threat Protection
Malware & URL Protection
Collaborative Threat Hunting
Mailbox-Level BEC Protection
SecOps
AI-Powered Phishing Incident Response
Virtual SOC Analyst (Themis)
Pricing
News & Awards
News
Awards
About
Our Story
Leadership Team
Careers
Customers
Support & Members
Resources
Free Tools
FREE Phishing URL Scanner
FREE Phishing Emulation
White Papers & Reports
Solution Briefs
Success Stories
Webinars & Videos
Blog
Partners
Partnership Program
Partner Portal
Privacy
Privacy Policy
Privacy Shield
DPA
EULA
Cookie Settings
Contact Us
© Copyright 2021 IRONSCALES
Toggle main menu visibility
Solutions
IRONSCALES Platform
Integrations
Threat Assessment
Phishing Simulation and Training
Phishing Emulator
Advanced Threat Protection
Malware & URL Protection
Mailbox-Level BEC Protection
Collaborative Threat Hunting
SecOps
AI-Powered Phishing Incident Response
Virtual SOC Analyst (Themis)
Resources
Free Tools
FREE Phishing URL Scanner
FREE Phishing Emulation
White Papers & Reports
Solution Briefs
Success Stories
Webinars & Videos
Company
About
Our Story
Leadership Team
Careers
News & Awards
News
Awards
Customers
Support & Members
Partners
Partnership Program
Partner Portal
Contact Us
Pricing
Blog
SIGN IN
FREE TRIAL
GET A Demo
Get Your Complimentary Access To
The Gartner Market Guide For Email Security >>
Blog Category - Forensics
All years
2021
2020
2019
2018
2017
2016
Eyal Benishti
2020 Jun 10
What Your Secure Email Gateway Is Missing
Test Your Email Security Against Phishing Attacks to Determine What Your Secure Email Gateway is Missing
READ MORE
Ian Baxter
2019 Oct 16
How To Mitigate Email Security Risk With Continuous Feedback Loops
By analyzing and learning from actionable machine and human intelligence, email security solutions can improve their ability to predict, detect and respond to email threats in real time.
READ MORE
Tristan Bishop
2019 Jan 1
The Three Must-Haves of a Truly Automated Email Security Solution
Automation is the latest trend in email security, but how can you tell a solution is truly automated?
READ MORE
Lomy Ovadia
2018 Nov 30
IRONSCALES & SNDBOX IDENTIFY A NEW MALWARE VARIANT
New threat uses a malicious #RTF file to infect machines with maldoc file currently going fully undetected
READ MORE
Eyal Benishti
2017 Aug 15
Understanding the Complexities of Email Phishing: The Role of Automation in Expediting the Remediation & Prevention Phase (Part II)
In our last blog post, we discussed the complexities of email phishing and the role of automation in expediting the forensics phase. In it, we
READ MORE
Eyal Benishti
2017 Jul 31
Understanding the Complexities of Email Phishing and the Role of Automation in Expediting the Forensics Phase
We recently wrote about the most prominent phishing attacks so far in 2017. Such attacks have led to record-breaking ransomware payments of more than $100
READ MORE
Categories
Bitcoin
,
Credential Theft
,
Impersonation
,
Machine Learning
,
Security Awareness Training