There are dozens of API-based email security vendors on the market. It’s a competitive market, and we’re always confident that our solution will win out. We know for...
There are dozens of API-based email security vendors on the market. It’s a competitive market, and we’re always confident that our solution will win out. We know for...
Just 3% of global security leaders rate their cyber hygiene as "Excellent," according to a new report. It's no surprise, then, that 75% of those surveyed in the same...
At The Channel Company’s XChange 2022 event recently, one of the speakers made a bold claim: "It's the person pressing the button. It's always a human making a mista...
A fairly basic attack has stolen thousands of accounts across major organizations.
Microsoft has reported on a new man-in-the-middle phishing campaign, which targeted over 10,000 organizations in the last year.
If you get an email from your CFO requesting urgent action, what do you do?
We have written ad nauseam about something we call The Static Expressway. This refers to the idea of hackers using legitimate web pages to host or send phishing cont...
Amazon Web Services (AWS) is one of the most popular cloud storage and hosting solutions. From major companies hosting their work on the service, to individuals usin...
A new survey found that threat intelligence is a critical part of an organization's cybersecurity strategy.
Hackers spoof brands all the time. They are usually popular brands, such as Microsoft or Apple.