email security
Anticipating the Unknowns: 2019 Cisco CISO Benchmark Study
3 min read
Today, we released our CISO Benchmark Study, an annual global survey of information security leaders working at organizations of all sizes and in all industries all over the world.
You’ve Got (Compromised) Mail!
3 min read
There are two kinds of people in this world: those who have been affected by Business Email Compromise (BEC) scams and those who don’t know they have been hit with...
Going with what works: The state of phishing
3 min read
Go phish! Cyber-attacks are big business. And the bad guys know that in any business, the more revenue you can generate with least investment means larger profits. It makes...
Phishing 101: Protection for Everyone
3 min read
For individuals, these simple steps can help protect you. They are not a complete solution, but they are helpful.
Your Email Security Toolbox: Defense in Depth
3 min read
Criminals know that easily-obtained data can help them craft a compelling attack campaign. Here are some essential tools defenders must have to thwart these sophisticated attacks.
Improve Office 365 Connectivity with Cisco SD-WAN
3 min read
As enterprises aggressively adopt SaaS applications such as Office 365, the legacy network architecture poses major problems related to complexity and user experience.
Don’t Feed the Phish: Implementing DMARC
3 min read
The Challenge of implementing SPF and DKIM: It’s no surprise that email authentication standards such as Sender Policy Framework (SPF) and DomainKeys Identified Mail (DKIM) have not...
Four Ways to Simplify Security
4 min read
Security breaches dominate headlines. From TechWorld's list of infamous data breaches to Wired Magazine's story about thrill-seeking teen hackers, evidence exists that it's difficult to secure everything.
Protecting against crypto mining and malware
4 min read
It wasn’t until late 2017 that threat researchers discovered spam campaigns delivering crypto payloads using email attachments. In some cases, a Word document downloads the crypto payload via a malicious...
3