Security Experts:

Email Security
long dotted

NEWS & INDUSTRY UPDATES

German software maker SAP has published 10 bulletins with fixes for a range of serious security vulnerabilities. [Read More]
The U.S. chipmaker is adding hardware to the arsenal of tools available to defend against destructive and costly ransomware attacks. [Read More]
Trend Micro warns that a previously unknown threat actor is targeting multiple organizations, including government entities, research institutions, and universities in Taiwan. [Read More]
New ransomware using strong encryption scheme to prevent decryption of hijacked data. [Read More]
The combined entity offers more than a half-dozen security solutions for data security risk detection and cyber-attack protection, response, and recovery. [Read More]
Cybercriminals employ COVID-19 vaccine-related schemes to obtain personal information and money from unsuspecting victims. [Read More]
A researcher earned over $13,000 from Facebook for a flaw that exposed the email address and birth date of Instagram users via the Facebook Business Suite. [Read More]
The 47-minute outage last Monday, which severely affected operations at workplaces and schools globally, was caused by a bug in an automated quota management system that powers the Google User ID Service. [Read More]
The iOS 14.3 and iPadOS 14.3 relese will provide cover for 11 documented security flaws, some serious enough to expose iPhones and iPads to code execution attacks. [Read More]
Guardicore warns that 250,000 MySQL databases from 83,000 victims have been compromised in an ongoing ransomware campaign. [Read More]

FEATURES, INSIGHTS // Email Security

rss icon

Alastair Paterson's picture
Organizations may not be able to mitigate BEC scams entirely; however, tightening up processes will ensure data exposure is kept to a minimum.
Ashley Arbuckle's picture
By learning from the past there are many steps we can take to strength our approach to security as attackers continue to turn to email to help accomplish their mission.
Siggi Stefnisson's picture
“Evasive phishing" is not a term much heard, but we all will—and need to—start talking a lot more about it than we have in the past.
Alastair Paterson's picture
BEC is becoming increasingly profitable for threat actors as organizations are making it easy for adversaries to gain access to the valuable information that sits within these inboxes.
Siggi Stefnisson's picture
We should be thinking about how users work, what they do and how it affects the security posture of the business, but does security really start with them?
Siggi Stefnisson's picture
Ninety percent of breaches may begin with an email, but today most of the action happens well after an inbound email has been scanned and delivered.
Josh Lefkowitz's picture
Even organizations with the most robust defense solutions and advanced automated technologies cannot effectively combat threats such as BEC without the adequate support and nuanced expertise of humans.
Jack Danahy's picture
To mitigate the risk of attacks, IT teams should disable unused tools and components, while deploying endpoint protection that doesn’t rely solely on file scanning or whitelisting.
Markus Jakobsson's picture
DMARC is an email authentication standard designed to eliminate phishing and other types of attack that use spoofing to misrepresent an email sender identity.
Markus Jakobsson's picture
Endpoint protection will never be able to catch up with “known wolves,” but machine learning and artificial perception can change the rules of engagement with models of “known good.”