by Brian McCarthy | Jul 17, 2019 | Uncategorized
Phishing attacks are increasingly using impersonation to bypass traditional defense mechanisms. Weak sender identification will continue to present opportunities for creative attacks. Security and risk management leaders should use this research to adjust their...by Brian McCarthy | Feb 4, 2019 | Uncategorized
How a CASB Integrates with an On-Premises DLP Solution Deployment architecture for enforcing DLP policies with a CASB and registering enforcement actions in an on-premises DLP solution. If you use an on-premises data loss prevention solution such as Symantec DLP, RSA...by Brian McCarthy | May 21, 2018 | Uncategorized
Do you know your spear phishing and vishing from your whaling and clone phishing? We explain how to recognize each type of threat. Every data breach and online attack seems to involve some kind of phishing attempt to steal password credentials, to launch...