Search results Search for: Search Refine your results by duration: Any Under 5 mins Under 20 mins Over 20 mins Sort by: Relevance Views Date How BEC Groups Exploit Generative AI to Launch Attacks SlashNext What’s Required to Stop Them? Learn how using Generative AI can proactively anticipate potential BEC threats created using the same AI technology. 4 days ago | 20 mins School of Phish: Importance of Three Categories of Protections Part 1: People Ken Dang, Sr. PMM; John Phil, Sr. SA; JT Fanning, Sr. TAM ENHANCE THE HUMAN LAYER OF CYBERSECURITY The first of this six-part series focuses on People and their role in the Importance of Three Categories of ... 1 week ago | 65 mins School of Phish: Importance of Three Categories of Protections - Process Ken Dang, Sr. PMM; Immanuel Chavoya, PSIRT; Sorosh Faqiri, PM; John Phil, Sr. SA; JT Fanning, Sr. TAM KNOW WHAT TO DO WHEN A SUSPECTED EMAIL THREAT IS DISCOVERED. Part two of this series delves into the importance of the organization’s operational pro... June 15, 2023 6:00pm SlashNext Launches Industry's First Generative AI Solution for Email Security SlashNext The industry’s first artificial intelligence solution that uses generative AI to defend against advanced business email compromise (BEC), supply chain... 2 months ago | 20 mins Replacing the SEG with Integrated Cloud Email Security (ICES) Jimmy Lin, Senior Director of Product Management Is the SEG dead? Watch and learn as we discuss replacing the SEG with ICES or integrated cloud email security; and why that should be on the top of y... 2 months ago | 38 mins School of Phish: Importance of Three Categories of Protections Pt 3: Technology Ken Dang, Sr. PMM; Immanuel Chavoya, PSIRT; Sorosh Faqiri, PM; John Phil, Sr. SA; JT Fanning, Sr. TAM UNDERSTAND THE RIGHT SECURITY TOOLS FOR THE JOB. Cloud Computing impacts just about everything we are experiencing today, from technology innovations... July 27, 2023 6:00pm Healthcare Cyberthreats: How to Combat BEC, Ransomware, and Phishing Attacks Eric George, Manager of Solution Engineering Cybercriminals register hundreds of thousands of look-alike domains every year to carry out a wide variety of attacks. Impersonating trusted healthcar... 2 months ago | 51 mins School of Phish Master's Program: The Threat Actors Tackle Box For Your Inbox Ken Dang, Sr. PMM; Immanuel Chavoya, PSIRT; Sorosh Faqiri, PM; John Phil, Sr. SA; JT Fanning, Sr. TAM BUILD A PRACTICAL THREAT ACTOR TACKLE BOX FOR YOUR INBOX Cloud Computing impacts just about everything we are experiencing today, from technology inn... August 24, 2023 6:00pm 2022 Fraud Trends & Technology Corey Lynch, Colin Parsons With the continuing rise in digital banking and increased demand for consumer convenience, 2022 saw significant challenges as fraudsters capitalized o... 2 months ago | 63 mins School of Phish Master's Program: A Mesh Defense Approach Ken Dang, Sr. PMM; Immanuel Chavoya, PSIRT; Sorosh Faqiri, PM; John Phil, Sr. SA; JT Fanning, Sr. TAM ESTABLISH A ROBUST MESH DEFENSE APPROACH AGAINST MODERN PHISING TTP Cloud Computing impacts just about everything we are experiencing today, from te... September 21, 2023 6:00pm Load more