Scareware Underscores the Need for Real-Time Phishing Threat Intelligence

Scareware. Just the name itself is rather foreboding. In fact, this deceptive phishing tactic …
The post Scareware Underscores the Need for Real-Time Phishing Threat Intelligence appeared first on SlashNext.
The post Scareware Underscores the Need fo… Continue reading Scareware Underscores the Need for Real-Time Phishing Threat Intelligence

Exploiting Browser Extensions to Compromise Corporate Networks – Why IT Teams Need Real-Time Protection

Today, all modern browsers such as Chrome, Edge, Firefox, and Safari provide third-party developers …
The post Exploiting Browser Extensions to Compromise Corporate Networks – Why IT Teams Need Real-Time Protection appeared first on SlashNext.
Continue reading Exploiting Browser Extensions to Compromise Corporate Networks – Why IT Teams Need Real-Time Protection

Aberdeen Report Reveals the Need for Speed in Phishing Attack Prevention

Late last year we reported in our 2018 Phishing Survey results that there is …
The post Aberdeen Report Reveals the Need for Speed in Phishing Attack Prevention appeared first on SlashNext.
The post Aberdeen Report Reveals the Need for Speed in Phish… Continue reading Aberdeen Report Reveals the Need for Speed in Phishing Attack Prevention

SlashNext Introduces Industry’s First Real-Time Phishing Threat Intelligence Service

Today marks an important time for SlashNext, IT security teams, and the security industry. …
The post SlashNext Introduces Industry’s First Real-Time Phishing Threat Intelligence Service appeared first on SlashNext.
The post SlashNext Introduce… Continue reading SlashNext Introduces Industry’s First Real-Time Phishing Threat Intelligence Service

2018 Summary – Data Breaches and Phishing Attacks Increase in Severity

As we get further into 2019, it’s time to look back on 2018, and …
The post 2018 Summary – Data Breaches and Phishing Attacks Increase in Severity appeared first on SlashNext.
The post 2018 Summary – Data Breaches and Phishing Attacks Inc… Continue reading 2018 Summary – Data Breaches and Phishing Attacks Increase in Severity

Two-Factor Authentication (2FA) is Just One Part of a Layered Phishing Defense

Staying ahead of phishing attacks is, and likely will always be, an uphill battle. …
The post Two-Factor Authentication (2FA) is Just One Part of a Layered Phishing Defense appeared first on SlashNext.
The post Two-Factor Authentication (2FA) is Just… Continue reading Two-Factor Authentication (2FA) is Just One Part of a Layered Phishing Defense

Workplace Expectations and Personal Exceptions: The Social Flaws of Email Security

While current email security solutions can help mitigate phishing impacts, companies must recognize the role of corporate email as a social network to address the human components of this risk.

The post Workplace Expectations and Personal Exceptions: The Social Flaws of Email Security appeared first on Security Intelligence.

Continue reading Workplace Expectations and Personal Exceptions: The Social Flaws of Email Security

Social Engineering Training: Why Getting Hacked Is a Security Advantage

Social engineering and security awareness training exercises can help business leaders uncover gaps in their incident response plans and identify poor security hygiene among employees.

The post Social Engineering Training: Why Getting Hacked Is a Security Advantage appeared first on Security Intelligence.

Continue reading Social Engineering Training: Why Getting Hacked Is a Security Advantage

Government Cybersecurity Processes Must Change Drastically to Keep Up With Complex Attack Vectors

Since governments have so many potential attack vectors to manage, government cybersecurity professionals need clear processes, procedures and authority to harden vulnerable environments.

The post Government Cybersecurity Processes Must Change Drastically to Keep Up With Complex Attack Vectors appeared first on Security Intelligence.

Continue reading Government Cybersecurity Processes Must Change Drastically to Keep Up With Complex Attack Vectors

Tackling phishing with signal-sharing and machine learning

Across services in Microsoft Threat Protection, the correlation of security signals enhances the comprehensive and integrated security for identities, endpoints, user data, cloud apps, and infrastructure. Our industry-leading visibility into the entire… Continue reading Tackling phishing with signal-sharing and machine learning