June 23, 2015
Adobe releases an emergency Flash Player patch for a zero-day flaw said to be used in a Chinese hacker group's phishing scheme.
June 02, 2015
Researchers estimate that 70% of organizations will have implemented virtual servers by the end of 2015, representing a tipping point in enterprises’ adoption of virtualization. Virtual machines (VMs) must be protected from malware like other systems but attackers are coming up with new ways to avoid detection and analysis. Security researchers have long used VMs to isolate and analyze malware, which has led to the misconception that malware disappears once it detects a VM. We look at how malware is adapting to virtual networks, and at the tools and processes that can help organizations secure these environments.
Meanwhile, rogue activity of insiders continues to surprise Fortune 1000 companies. According to some studies, 80% of cybersecurity breaches are aided and abetted by insiders. Yet many CIOs continue to remain skeptical about investments in employee cybersecurity awareness training. New technologies now focus on user credentials, employee actions and behavior analytics. We look at the security culture in today's organizations and effective strategies to improve visibility, policy and prevention of insider threats.
A new class of endpoint threat detection products is designed to improve visibility across endpoints, hunt for threats, automate incident response and cut down on false alerts overwhelming security teams. How do they work? We interview CSOs who have invested in endpoint defense and remediation tools and share their views on the pros, cons and common deployment scenarios.
April 10, 2015
News roundup: Technology and security acquisitions have seen some healthy activity in 2015, driven by two key trends. Plus: 75% of users aren't vulnerable to Heartbleed?; White House hack tied to phishing; first state digital ID law.
March 20, 2015
Experts say attacks on cloud application credentials are increasing, and vulnerability scans and penetration tests can't tell if an account has been compromised.
Phishing Get Started
Bring yourself up to speed with our introductory content
Use these guidelines to test how secure your Exchange setups actually are. Continue Reading
Expert Karen Scarfone examines the most important criteria for evaluating email security gateway products for deployment within an enterprise. Continue Reading
Tabnapping can be used to capture user login credentials. Enterprise threats expert Nick Lewis explains how to defend against the risk. Continue Reading
Evaluate Phishing Vendors & Products
Weigh the pros and cons of technologies, products and projects you are considering.
Phishing attacks are adopting new functionality to avoid detection, including the use of proxy programs to simplify the attack process. Learn how to defend against this type of risk. Continue Reading
Exchange admins can use the recent State Department hack as a lesson in the importance of consistent security protocols. Continue Reading
Expert Nick Lewis explores the latest spam defense methods and products that will help enterprises defend against new and emerging spam techniques. Continue Reading
Learn to apply best practices and optimize your operations.
The consequences of phishing attacks could fall on the victims as enterprises start to punish employees who fall for this age-old scam. Expert Joseph Granneman discusses why this approach may have merit. Continue Reading
Phishing attacks are the most popular causes of data breaches in the enterprise. Here are three reasons why. Continue Reading
Building on what cybercriminals began, security services from many countries have the capability to attack and steal for their national interests. Continue Reading
Problem Solve Phishing Issues
We’ve gathered up expert advice and tips from professionals like you so that the answers you need are always available.
Move beyond prevention to fast detection to combat a stealthy social engineering attack. Continue Reading
Enterprise social media has revolutionized how businesses communicate with consumers. However, it has also made brand hacking an even larger concern. Continue Reading
Email addresses are prime targets of phishing schemes. Uncover how to mitigate these risks and learn tips for ensuring email address security. Continue Reading