10 Ways URL Analysis & Enrichment Can Help Ease Your SOC’s Challenges in 2020
If you’re in the IT security space, you no doubt realize that phishing remains a constant threat. Exploiting the human attack surface is at the start and heart of most…
If you’re in the IT security space, you no doubt realize that phishing remains a constant threat. Exploiting the human attack surface is at the start and heart of most…
With growing enterprise mobility requirements plus higher numbers of remote workers, properly securing mobile and remote users is causing IT security teams to rethink their endpoint security strategies. VPN tunneling…
Lightweight, cloud-powered endpoint solutions protect remote users from the new multi-vector phishing threat landscape At SlashNext, protecting organizations from advanced phishing threats isn’t a part-time job. It’s our full-time focus.…
As we near the end of the year, it’s always nice to look back and reflect on trends we saw. Phishing threats are continually evolving, and our blog topics reflect…
In their survey of security-focused professionals, Osterman Research came away with some key network security insights worth sharing.
Advanced Persistent Threats (APTs) are sophisticated, often multi-component network attacks that, by definition, often go undetected for quite some time.
Commissioned research shows that more security influencers and decision makers want security infrastructure that goes beyond what they currently have in place.
While C-level executives may feel they are in compliance, the lack of communication with them can spell trouble. Could cybersecurity automation be the answer?
The 2019 data breach numbers for the healthcare industry drive home both the lack of focus on phishing security and the obvious need for it.
The FBI recently delivered a Private Industry Notification (PIN) in which it pointed to phishing attacks and two new hacker tools that can bypass two-factor authentication.