Security Experts:

Email Security
long dotted

NEWS & INDUSTRY UPDATES

Full video of panel discussion from SecurityWeek's 2021 CISO Forum on navigating software bill of materials (SBOM) and supply chain security transparency. [Read More]
Weir Group says the attack forced it to isolate and shut down systems and that engineering applications were only partially restored. [Read More]
Redmond threat hunters technical details on UNC-0343, an Iran-linked apex actor using password spraying to break into Office 365 accounts since at least July 2021. [Read More]
Eric Iwu, resident of Buffalo, New York, faces up to 20 years in prison for participating in BEC scams targeting various companies. [Read More]
Mondoo plans to use the new funding to accelerate development of its cloud-native platform to provide developers with automated risk assessments. [Read More]
Threat hunters at ESET document a UEFI bootkit capable of hijacking the EFI System Partition (ESP) to maintain persistence on infected Windows machines. [Read More]
The Israeli startup raises new capital to build technology that automates the security and management of SaaS applications. [Read More]
Private equity firm Symphony Technology Group announced the merger of McAfee Enterprise and the newly acquired FireEye Products into a single pure-play cybersecurity company. [Read More]
Researchers discover a threat actor setting up a fake Amnesty International website to distribute phony anti-virus software. [Read More]
Mariana Trench is an open-source tool that Facebook's security team has used internally to identify vulnerabilities in Android and Java applications. [Read More]

FEATURES, INSIGHTS // Email Security

rss icon

Keith Ibarguen's picture
Leverage the power of the collective - the network effect – for its ever-evolving intelligence wherever possible to keep your employees free of all the bad stuff that has made it to their inboxes.
Keith Ibarguen's picture
Leveraging humans for detection makes it hard for the attackers to predict whether or not their malicious emails will be identified and using technology to automate response provides scale and speed in resolution.
Idan Aharoni's picture
SPF, DMARC and DKIM are three email security methods that work together to prevent unauthorized third parties from sending emails on behalf of a domain.
Alastair Paterson's picture
Organizations may not be able to mitigate BEC scams entirely; however, tightening up processes will ensure data exposure is kept to a minimum.
Ashley Arbuckle's picture
By learning from the past there are many steps we can take to strength our approach to security as attackers continue to turn to email to help accomplish their mission.
Siggi Stefnisson's picture
“Evasive phishing" is not a term much heard, but we all will—and need to—start talking a lot more about it than we have in the past.
Alastair Paterson's picture
BEC is becoming increasingly profitable for threat actors as organizations are making it easy for adversaries to gain access to the valuable information that sits within these inboxes.
Siggi Stefnisson's picture
We should be thinking about how users work, what they do and how it affects the security posture of the business, but does security really start with them?
Siggi Stefnisson's picture
Ninety percent of breaches may begin with an email, but today most of the action happens well after an inbound email has been scanned and delivered.
Josh Lefkowitz's picture
Even organizations with the most robust defense solutions and advanced automated technologies cannot effectively combat threats such as BEC without the adequate support and nuanced expertise of humans.