More than 1.7 million customers in South Australia depend on SA Power Networks to build and maintain their energy infrastructure. This leading utility takes its responsibility to all these customers extremely seriously.
In this case study, SA Power knew it was important to strengthen their email security to avoid...
A day of reckoning is coming for email deliverability. New requirements from Google and Yahoo could block critical customer emails or mark them as spam if not properly authenticated.
This is where DMARC (Domain-based Message Authentication Reporting and Conformance) and DKIM (DomainKeys Identified Mail) come into...
In recent years, many of the world’s biggest companies have migrated to the cloud. With a large portion of them choosing Microsoft 365, it’s no surprise that it has become a prime target for cyber criminals. And while Microsoft has a host of native email security capabilities, they’re simply no match for...
Your secret weapon to combat cyber threats might be just under your nose! Cybercriminals continue to exploit vulnerabilities while upping their game with new and more sinister attack methods. The human firewall is your cybersecurity ace in the hole.
But how resilient are your users when it comes to fending off...
Abnormal Security has raised $250 million in a Series D round led by Wellington Management, aiming to expand its AI-driven human behavior security platform globally. The funds will support new product development, international market entry, and preparations for a future IPO.
Frost & Sullivan recently recognized Fortra as a Leader in its Frost Radar: Email Security, 2024 report. It specifically named Fortra’s Cloud Email Protection solution, which provides advanced protection against BEC, impersonation, and other advanced email threats. Here's just some of the reasons why Fortra has been...
Microsoft’s native and add-on email security capabilities help to protect against basic threats, but they aren’t enough to ensure full protection. Learn how a multi-layered human-centric security strategy can augment Microsoft 365 to defend against modern threats like business email compromise, advanced phishing,...
Social engineering and phishing are not just IT buzzwords; they are potent threats capable of causing devastating damage to your organization. Bad actors and the technology they use to infiltrate your defenses are evolving at lightning speed. The only way to safeguard your assets and data is to stay ahead of the game...
2024 is the year to start bolstering your email security. This detailed report by The Radicati Group explores the current market landscape, identifying key players and emerging technologies that are shaping the future of secure email solutions.
Learn about the latest advancements in email security,...
Your software cybersecurity competency is under increasing pressure as cyber attackers "up" their games and new compliance regulations shift cyber risk toward device and software manufacturers.
It's time to get ready. Agile, DevOps and IT teams are integral elements of your cybersecurity strategy. Align and...
KnowBe4 purchased an email security provider founded by a Check Point veteran to offer AI-based email protection and training that's automatically tailored relative to risk. Acquiring Egress will help organizations prevent, protect and defend against sophisticated email cybersecurity threats.
The independent Cyber Safety Review Board published a scathing report that recommends an overhaul of Microsoft's security infrastructure and says the tech giant's operational and strategic decisions led to the successful Chinese hacking campaign that targeted top U.S. government officials.
With nearly 350 billion emails sent every day, many containing sensitive data and plans, it's a worrying fact that more than 90% of all successful cyber-attacks start with a phishing email.
The widespread use of LLMs has enabled cyber-criminals to launch sophisticated phishing attacks at scale, which evade...
Phishing attacks often feel like an unrelenting tsunami, flooding your organisation with a never-ending deluge of threats.
Traditional methods for analysing and mitigating phishing attacks are manual, repetitive and error-prone. These workflows slow the speed at which you can mitigate a spear-phishing attack and...
Researchers have created a zero-click, self-spreading worm that can steal personal data through applications that use chatbots powered by generative artificial intelligence. Dubbed Morris II, the malware uses a prompt injection attack vector to trick AI-powered email assistant apps.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.com, you agree to our use of cookies.