Lisa O'Reilly

Your SOAR Has Changed Your Life, Here Are Three Ways It Can Work Harder

The SOAR has earned a well-deserved place in the enterprise security stack as an indispensable tool to save time, improve…

6 months ago

Going Beyond Awareness Training to Protect Mobile Devices from Phishing

According to the 2020 Verizon Mobile Security Index report, 85 percent of attacks seen on mobile devices took place outside…

6 months ago

5 Ways Phishing Attacks Manipulate Mobile Devices Outside Email

Given the current demand for remote working, phishing attacks on mobile devices are particularly worrisome for security professionals. There is…

6 months ago

5 Ways URL Analysis and Enrichment Benefits Managed Service Providers

Researching URLs in suspected phishing incidents is a costly and time-intensive process, according to a survey* of 300-plus security decision-makers.…

7 months ago

Expand Your MSSP Portfolio with 360 Protection Across Mobile, Email, and Web

As security threats become progressively sophisticated, IT organizations are looking to managed security services to provide trusted security solutions to…

7 months ago

Three Ways URL Analysis and Enrichment Can Elevate Today’s SOAR Solutions

The SOAR has earned a well-deserved place in the enterprise security stack as an indispensable tool to save time, improve…

8 months ago

Multi-Stage Phishing Attacks Launch Local Files to Evade Existing Security

SEERTM (Session Emulation and Environment Reconnaissance) is SlashNext’s own proprietary and patented threat detection technology and the foundation of our…

8 months ago

Covid-19 Fears Present Opportunities for New Phishing Campaigns

Threat actors have jumped aboard the global coronavirus bandwagon in an attempt to capitalize on this global health emergency. Whenever…

8 months ago

New Remote Worker Shift Requires a Robust Phishing Protection Toolbox

With the COVID-19 pandemic spreading throughout the United States, it’s likely that most US workers will find themselves working from…

9 months ago

4 Phishing Protection Gaps that SEGs Cannot Address

A Markets Insider article cited a Cofense report (2019 Phishing Threats and Malware Review) that highlighted some interesting, though not…

9 months ago