33% of Reported Phishing Emails Prove Malicious or Suspect
September 9 2021A new analysis from F-Secure details commonly used phishing phrases and methods seen in attacks.
Read moreA new analysis from F-Secure details commonly used phishing phrases and methods seen in attacks.
Read moreSecurity practices must change to reflect the reality that remote/hybrid work is the new norm. Here are three risk mitigation measures for a remote-first world.
Read moreThe acquisition will help FireMon deliver capabilities for detecting security threats to enterprise data in public cloud infrastructure, CEO Jody Brazil says.
Read moreNow is the time for organizations to rethink their security strategies with a platform- and architecture-based approach in mind. Keanini explains.
Read moreCriminals begin moving laterally inside a target network within 92 minutes of gaining access and demonstrate new stealthy capabilities, a new report shows.
Read moreOn Advanced Practices, we are always looking for new ways to find malicious activity and track adversaries over time. Today we’re sharing a technique we use to...
Read moreOn Advanced Practices, we are always looking for new ways to find malicious activity and track adversaries over time. Today we’re sharing a technique we use to...
Read moreOn Advanced Practices, we are always looking for new ways to find malicious activity and track adversaries over time. Today we’re sharing a technique we use to...
Read moreThis is a current list of where and when I am scheduled to speak: I’m speaking (via Internet) at SHIFT Business Festival in Finland, August 25-26, 2021. I’ll be speaking at...
Read more
Recent Comments