Combat Phishing Attacks Using Modern Machine Learning Algorithms

Presented by

Peter Draper, Technical Director - EMEA, Gurucul

About this talk

Phishing attacks are one of the most common techniques used to acquire sensitive information including passwords, credit card information or account details. While many technologies seek to detect phishing, it's effectiveness relies on circumventing those sensors. With social engineering tactics, hackers use terms like "Urgent! Attention required in order to keep your account active" to trick employees into clicking on bad links. The newest phishing scam today involves sending a fake invoice loaded with malware. Modern machine learning algorithms can detect the change in a user's behavior from the moment the credentials are compromised. Detection can be tied to specific activities such as a series of failed login attempts, an atypical IP address or unusual activity in general. Watch this webinar to: - Learn how to combat phishing attacks using modern machine learning algorithms - Find out how this solution can benefit your organization

Related topics:

More from this channel

Upcoming talks (1)
On-demand talks (57)
Subscribers (2114)
Gurucul is transforming enterprise security with user behavior based machine learning and predictive analytics. Using identity to monitor for threats, Gurucul provides Actionable Risk Intelligence™ to protect against targeted and under-the-radar attacks. Gurucul is able to proactively detect, prevent, and deter advanced insider threats, fraud and external threats to system accounts and devices using self-learning, behavioral anomaly detection algorithms. Gurucul is backed by an advisory board comprised of Fortune 500 CISOs, and world renowned-experts in government intelligence and cyber security. The company was founded by seasoned entrepreneurs with a proven track record of introducing industry changing enterprise security solutions. Our mission is to help organizations protect their intellectual property, regulated information, and brand reputation from insider threats and sophisticated external intrusions.