We know that email has long been the dominant attack vector.
We know that email has long been the dominant attack vector.
Do you know how to measure how well your email security solution is performing? It can seem like a tall task. However, with our brand new calculator, we can figure o...
When hackers find something that works, they keep going at it until it doesn't.
Last week, we published an Attack Brief that highlighted how hackers are spoofing Walgreens.
G2 announced their Best Security Products List of 2022.
ThreatCloud, Check Point's threat intelligence repository, does 86 billion transactions a day.
At Avanan, we have a saying: Don't take our word for it.
In 2021, hackers were more productive than ever. In 2021, according to Check Point Research, over 10,000 new malicious files and 100,000 new malicious websites were ...
PowerPoint has a number of add-on files that add features and capabilities. One of these is the .ppam file.
Back when email was on-prem, Secure Email Gateways were the standard. They protected your email server, using a security stack designed specifically for on-prem emai...