As you know, impostor email continues to be a challenge for most security professionals. We are going to discuss the tactics and targets of impostor email via this Email Fraud Workshop breakout. Denis Ryan, Sr. Director of Email Fraud at Proofpoint, will discuss:
The email threat landscape;
How to identify potential...
Business email compromise attacks continue to be lucrative for the criminally inclined. With the FBI reporting that reports of such attacks have recently doubled, researchers find that tricking victims into making fraudulent wire transfers remains attackers' top goal.
This white paper discusses the optimal method of enabling security for Office 365 so as to maximize protection against the growing array of security threats that organizations will encounter, while minimizing the total cost of ownership.
Download and read this white paper and you will learn:
How moving to the...
Decision makers evaluating the efficacy of Office 365 to meet their business requirements must be aware of its shortcomings in the areas of data protection, archiving, security, encryption, authentication and eDiscovery.
Download this white paper and learn:
Why the risks of relying solely on Office 365 are...
Advanced attacks such as business email compromise and account takeover-based attacks continue to be a leading way attackers are bypassing Secure Email Gateways (Exchange Online Protection included). Unfortunately, the majority of such attacks target Office 365 organizations.
To stop these attacks a new model...
A large Midwestern health network says a successful phishing campaign exposed a raft of personal and medical data stored in its email systems. The count of affected victims numbers 1.4 million, although investigators believe stealing personal data was not the attackers' goal.
Medical laboratory testing firm LabCorp is investigating a weekend cyberattack on its IT network, which resulted in the company taking certain processes offline. The attack is just the latest cyber assault on the healthcare sector.
Known losses due to business email compromise have exceeded $12.5 billion worldwide, the FBI's Internet Complaint Center reports, adding that fraudsters are increasingly targeting the U.S. real estate sector with such scams.
A six-month coordinated global law enforcement effort to crack down on business email compromise schemes has resulted in 74 arrests, the U.S. Department of Justice announced Monday.
File-less malware is a huge security challenge for organizations today, and traditional email security controls aren't sufficient to meet the challenge. It's time for a new approach email security.
The big issue is: The malicious payloads shift so much. It's really easy to do 100 variants of the same malicious...
A consistent message throughout this Summit: Most threats to an organization continue to enter through the route of least resistance - email. In this session, hear directly from a CISO on why email security needs renewed focus and how he's addressed it in his own organization, including:
Why smart employees continue...
Late last year in Australia, cybercriminals began targeting a fertile yet relatively poorly protected business sector for so-called business email compromise scams: the real estate industry. One expert says the industry, highly dependent on email, is ill-prepared for the attacks.
Business email compromise and account takeover attacks haven't faded; they've just morphed. Attacks are trending away from the old, static form and moving towards bypassing security controls and using social engineering techniques to ensnare victims.
Download this whitepaper on this new wave of attacks and learn...
What are the latest trends in BEC attacks? Does your organization have the security controls and resources in place to defend against them?
Download this report featuring exclusive BEC research and learn:
Which malicious emails bypass traditional email security protocols;
What a typical organization sending BEC...
Business email compromise attacks that impersonate executives and business partners to trick employees are "the biggest security issue in all of technology today," says Dan Hoffmann of Agari.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.