secure email
Hiding in Plain Sight: How Subdomain Attacks Use Your Email Authentication Against You
3 min read
Understanding the tricky way that subdomain attacks use your email authentication against you.
The Definitive Guide to Cloud Office Security
14 min read
Fake invoice email or Invoice fraud is a form of BEC business email compromise. Learn the warning signs and how to identify them.
Securing the #1 threat vector is a key part of an effective XDR strategy
3 min read
Email is still the #1 threat vector. Discover the ways email security plays a key role in an effective extended detection and response (XDR) strategy.
Understanding Business Email Compromise to better protect against it
2 min read
Understanding business email compromise tactics is the best way to identify the best solution to protect against it.
Secure Email Threat Defense: Providing critical insight into business risk
2 min read
Discover the ways that Secure Email Threat Defense uses advanced threat capabilities to identify the intent of an attack and provide insight into business risk.
Explorations in the spam folder–Holiday Edition
7 min read
We explore spam campaigns during this holiday season, demonstrating what can happen if someone actually clicks on links or open attachments in these unsolicited emails.
How can I help protect my company from phishing attacks?
3 min read
Discover the ways you can help your organization avoid becoming a target of Business Email Compromise, a particularly dangerous and costly form of phishing.
10 Warning Signs You’ve Received a Fake Invoice Email
5 min read
Fake invoice email or invoice fraud is a form of BEC business email compromise. Learn the warning signs and how to identify them.