Airbus Attacked by Avivore – China’s Bird Eater

| | current-events
Last week brought to light the significant challenge aerospace and defense companies face in protecting their IP. According to ZDNet, European aerospace and defense giant Airbus had its IP stolen by Chinese hacking group Avivore. Avivore – which translates as Bird Eater – successfully compromised Airbus by going after its ... Read More
PreVeil Series B Funding Video

Sumitomo Corporation’s Presidio Ventures Leads Series B Investment in PreVeil

| | PreVeil
We are very excited to announce that Presidio Ventures, the venture investment arm of Sumitomo Corporation, is leading the Series B investment in PreVeil. Spark Capital, who led PreVeil’s Series A, has also invested in this round. Sumitomo, one of Japan’s largest business conglomerates, recognizes that ensuring the security and ... Read More
Passwordless authentication for email

Passwordless authentication for email

While email systems have long relied on passwords as their first line of defense for security, they have not proved a worthy adversary to attackers. Passwords have proven a weak method for authenticating a user’s identity. Why? Because attackers are frequently able to guess, hack or phish passwords. And once ... Read More
5 Things You Should Know About Whale Phishing

5 Things You Should Know About Whale Phishing

| | PreVeil
Whale phishing is a type of phishing attack that focuses on high-profile employee targets, such as the CEO or CFO. Since individuals in the C-suite are significant to the company leadership, they are called “whales”. So, phishing attacks on these folks get called “whale phishing” As a security professional, you ... Read More
Encryption for Email and File Sharing That's Easy to Use

Secure File Sharing: The next NIST Standard

Last week, Senator Ron Wyden of Oregon sent a letter to the National Institute of Standards (NIST) asking them to: ‘create and publish guidance describing how individuals and organizations can safely share sensitive documents with others over the internet’ Senator Wyden said this standard was necessary because: ‘in many government ... Read More
Insecure Communications: Why Your Emails aren’t as Private as You Think

Insecure Communications: Why Your Emails aren’t as Private as You Think

| | PreVeil
The internet gives us access in ways we couldn’t have imagined just a generation ago. We can do research in mere seconds that would have taken hours, even days. We can communicate with people half a world away, effortlessly. We can book trips, order conveniences, and manage our lives with ... Read More

Back Doors – A Bad Idea for Good People

| | current-events
Requiring cloud providers to provide back doors for law enforcement will weaken security for everyone. A back door in security is a way for government, law enforcement, or some other entity to access encrypted or locked information. If I want to protect my data from others using some kind of ... Read More
Encrypted Email for Securing the Enterprise

Email encryption and protecting executive communications

Verizon’s recent Data Breach Investigations Report (DBIR) notes that company executives are six times more likely than regular employees to be targets of a social engineering attack. Social engineering is often the first step attackers take towards business email compromise (BEC). Last year alone, BEC cost businesses over $1.2 billion ... Read More

PreVeil Launches new Partner Program for Cybersecurity Service Providers

| | PreVeil
PreVeil, a leader in making encryption useable for everyday business, today launched the PreVeil Partner Program. This new program gives Managed Service Providers (MSPs) MSSPs and VARs access to PreVeil’s innovative data security solutions that help organizations big and small protect their most sensitive emails and files. Led by Jamie ... Read More
WebPreVeil Demo

Launch of Web PreVeil

Encrypted email solutions for the enterprise have long been cumbersome for admins to manage and for employees to use. As a result, most enterprises use these solutions sparingly, begrudgingly or not at all. Solutions such as s/MIME require admins to go through the painful requisition and management of certificates. For ... Read More