BYOD Trends and Endpoint Security — What’s best for your organization?

The BYOD (Bring-Your-Own-Device) age has been around now for some time, and the megatrends of remote work brought on by the pandemic have influenced the phishing landscape with significant business impact. While it benefits companies to allow BYOD to r… Continue reading BYOD Trends and Endpoint Security — What’s best for your organization?

Your SOAR Has Changed Your Life, Here Are Three Ways It Can Work Harder

The SOAR has earned a well-deserved place in the enterprise security stack as an indispensable tool to save time, improve accuracy, and increase efficacy. While SOARs simplify security operations by automating threat management and incident response, t… Continue reading Your SOAR Has Changed Your Life, Here Are Three Ways It Can Work Harder

Going Beyond Awareness Training to Protect Mobile Devices from Phishing

According to the 2020 Verizon Mobile Security Index report, 85 percent of attacks seen on mobile devices took place outside of email.  They break down these phishing attack vectors in this way: Messaging – 17% Social Media – 16% Gaming… Continue reading Going Beyond Awareness Training to Protect Mobile Devices from Phishing

Three Ways URL Analysis and Enrichment Can Elevate Today’s SOAR Solutions

The SOAR has earned a well-deserved place in the enterprise security stack as an indispensable tool to save time, improve accuracy, and increase efficacy. While SOARs simplify security operations by automating threat management and incident response, t… Continue reading Three Ways URL Analysis and Enrichment Can Elevate Today’s SOAR Solutions

Multi-Stage Phishing Attacks Launch Local Files to Evade Existing Security

SEERTM (Session Emulation and Environment Reconnaissance) is SlashNext’s own proprietary and patented threat detection technology and the foundation of our anti-phishing solutions. One of its best features is preemptive threat hunting that allows… Continue reading Multi-Stage Phishing Attacks Launch Local Files to Evade Existing Security

Covid-19 Fears Present Opportunities for New Phishing Campaigns

Threat actors have jumped aboard the global coronavirus bandwagon in an attempt to capitalize on this global health emergency. Whenever public emotions are running high, cybercriminals try to take advantage of human curiosity, fear, anxiety, and the in… Continue reading Covid-19 Fears Present Opportunities for New Phishing Campaigns

4 Phishing Protection Gaps that SEGs Cannot Address

A Markets Insider article cited a Cofense report (2019 Phishing Threats and Malware Review) that highlighted some interesting, though not surprising, findings. Some of the key takeaways from the Cofense report: Between October 2018 and M… Continue reading 4 Phishing Protection Gaps that SEGs Cannot Address

10 Ways URL Analysis & Enrichment Can Help Ease Your SOC’s Challenges in 2020

If you’re in the IT security space, you no doubt realize that phishing remains a constant threat. Exploiting the human attack surface is at the start and heart of most cybersecurity breaches, it often goes undetected until too late, requires a bi… Continue reading 10 Ways URL Analysis & Enrichment Can Help Ease Your SOC’s Challenges in 2020

C-Level Security Compliance – The Need for Communication and Automation

A recent Dark Reading article – The Real Reason Why the C-Suite Isn’t Complying […]
The post C-Level Security Compliance – The Need for Communication and Automation appeared first on Security Boulevard.
Continue reading C-Level Security Compliance – The Need for Communication and Automation

How URL Filtering Fails Users (and What You Should Do)

URL filtering is a feature of most Next-Generation Firewalls (NGFW) and some Web Proxies. […]
The post How URL Filtering Fails Users (and What You Should Do) appeared first on Security Boulevard.
Continue reading How URL Filtering Fails Users (and What You Should Do)