Search results

From Phishing to Deepfakes: Staying Ahead in AI-Powered Cybercrime

Despite Secure Email Gateways (SEGs) embracing AI, phishing still reaches the inboxes of users. Therefore, employees need to be able to identify attacks, a
skill they can learn with proper training. Join James Hickey, Senior Product Marketing Manager - Cofense, for this session to find out why trusting a
technology-only approach to email security can leave you dangerously exposed: • Discover why technology alone cannot fully detect or prevent phishing. •…

The Great SEG Migration: 7 Lessons Learned from Replacing 200+ Secure Email Gateways

Why have 70%+ of Abnormal customers moved away from their third-party secure email gateway entirely? What was their experience in implementing
next-generation email security? And what can others learn from the process? We’re diving into the answers to all those questions in this webinar featuring
Solutions Architect Dan Nickolaisen! In his four years at Abnormal Security, he’s helped over 200 customers replace their secure email gateways, and now …

Understanding SASE: SASE and Secure Web Gateway

Join us in the fourth of five sequential webinars about the benefits and capabilities of Secure Access Service Edge (SASE). In this webinar we will take a
detailed look at Secure Web Gateway (SWG), one of the most important elements of a comprehensive SASE implementation. Attend and get: A thorough
discussion of why SWG is critically needed to protect your environment against sophisticated cyber threats—which often use compromised web traffic for th…

Shields Health Solution: A new paradigm in email security

The reality is, you can’t stop people from using email – so there will always be risk from inbound and outbound threats. Traditional secure email gateways
(SEGs) cannot be depended on to effectively defend people from advanced phishing attacks and prevent them from leaking sensitive data. Watch this
webinar to hear from Rob Fountaine, Principal Security Engineer at Shields Health Solutions, and Sudeep Venkatesh, Chief Customer Officer at Egress, as th…

What's Making It Past Secure Email Gateways?

How frequently are advanced threats actually bypassing your email security controls? One of the greatest challenges to protecting end users from high
impact email attacks is detecting identity deception. Fortra has conducted an analysis of real end user phishing reports to determine which advanced threat
types evade common secure email gateways and the frequency which they occur to better understand how enterprises can stop these attacks. John Wilso…

East of England Ambulance Service: People are your biggest risk when using email

Cybercriminals don’t discriminate between non-profit organizations delivering social impact and corporates. In fact, resource-constrained entities are seen as
an easier target for the advanced phishing attacks that are designed to get through Microsoft 365 and secure email gateway detection and that, if successful,
can lead to service disruption that puts lives at risk. Watch this webinar and hear from guest speakers Stephen Bromhall and Dean Ayres, East of England A…

Anatomy of a Business Email Compromise

Business Email Compromise (BEC) has become a significant threat to organizations of all sizes, often resulting in hefty financial losses, operational
disruptions, and reputational damage. Learn from HaystackID’s seasoned cybersecurity experts how to detect and prevent BEC attacks during our upcoming
webcast, “Anatomy of a Business Email Compromise.” During the in-depth presentation, our team will guide you through the anatomy of a BEC attack, fro…

Linklaters: Using machine learning to make email DLP work in the real world

91% of organizations experienced outbound email security incidents in their Microsoft 365 environment, with 86% suffering negative impacts as a result. As
clearly demonstrated, previous approaches to email data loss prevention (DLP) are ineffective at detecting and preventing these incidents, with static rules
unable to meet organizations’ demands and understand human behavior. A new approach is needed. Join this webinar to hear from Jon Segger, Head of I…

How to Protect Against Advanced Email Threats

Organizations need comprehensive solutions to combat sophisticated threats. Your email security solution should include collecting threat intelligence,
mitigating against brand impersonation, and training employees on security awareness, all while maintaining compliance. That may sound like a tall order,
but with our experts’ overview of Fortra’s suite of email security solutions, you’ll learn: How threat-specific technology and operations deliver unparalleled t…

What's Making It Past Secure Email Gateways?

How frequently are advanced threats actually bypassing your email security controls? One of the greatest challenges to protecting end users from high
impact email attacks is detecting identity deception. Fortra has conducted an analysis of real end user phishing reports to determine which advanced threat
types evade common secure email gateways and the frequency which they occur to better understand how enterprises can stop these attacks. John Wilso…