Search results


From Phishing to Deepfakes: Staying Ahead in AI-Powered Cybercrime

From Phishing to Deepfakes: Staying Ahead in AI-Powered Cybercrime

Channel Logo
James Hickey - Senior Product Marketing Manager, Cofense

Despite Secure Email Gateways (SEGs) embracing AI, phishing still reaches the inboxes of users. Therefore, employees need to be able to identify attacks, a
skill they can learn with proper training. Join James Hickey, Senior Product Marketing Manager - Cofense, for this session to find out why trusting a
technology-only approach to email security can leave you dangerously exposed: • Discover why technology alone cannot fully detect or prevent phishing. •…

The Great SEG Migration: 7 Lessons Learned from Replacing 200+ Secure Email Gateways

The Great SEG Migration: 7 Lessons Learned from Replacing 200+ Secure Email Gateways

Channel Logo
Dan Nickolaisen, Solution Architect, Abnormal Security

Why have 70%+ of Abnormal customers moved away from their third-party secure email gateway entirely? What was their experience in implementing
next-generation email security? And what can others learn from the process? We’re diving into the answers to all those questions in this webinar featuring
Solutions Architect Dan Nickolaisen! In his four years at Abnormal Security, he’s helped over 200 customers replace their secure email gateways, and now …

Understanding SASE: SASE and Secure Web Gateway

Understanding SASE: SASE and Secure Web Gateway

Channel Logo
Teddy Nicoghosian (Principal Technical Product Marketing Manager), Gus Fernandez (Consulting System Security Engineer)

Join us in the fourth of five sequential webinars about the benefits and capabilities of Secure Access Service Edge (SASE). In this webinar we will take a
detailed look at Secure Web Gateway (SWG), one of the most important elements of a comprehensive SASE implementation. Attend and get: A thorough
discussion of why SWG is critically needed to protect your environment against sophisticated cyber threats—which often use compromised web traffic for th…

Shields Health Solution: A new paradigm in email security

Shields Health Solution: A new paradigm in email security

Channel Logo
Rob Fountaine (Principal Security Engineer at Shields Health Solutions) & Sudeep Venkatesh (Chief Customer Officer at Egress)

The reality is, you can’t stop people from using email – so there will always be risk from inbound and outbound threats. Traditional secure email gateways
(SEGs) cannot be depended on to effectively defend people from advanced phishing attacks and prevent them from leaking sensitive data. Watch this
webinar to hear from Rob Fountaine, Principal Security Engineer at Shields Health Solutions, and Sudeep Venkatesh, Chief Customer Officer at Egress, as th…

What's Making It Past Secure Email Gateways?

What's Making It Past Secure Email Gateways?

Channel Logo
John Wilson - Senior Fellow, Threat Research Fortra

How frequently are advanced threats actually bypassing your email security controls? One of the greatest challenges to protecting end users from high
impact email attacks is detecting identity deception. Fortra has conducted an analysis of real end user phishing reports to determine which advanced threat
types evade common secure email gateways and the frequency which they occur to better understand how enterprises can stop these attacks. John Wilso…

East of England Ambulance Service: People are your biggest risk when using email

East of England Ambulance Service: People are your biggest risk when using email

Channel Logo
Stephen Bromhall and Dean Ayres, East of England Ambulance Service Trust (EEAST) & Tony Pepper (Egress)

Cybercriminals don’t discriminate between non-profit organizations delivering social impact and corporates. In fact, resource-constrained entities are seen as
an easier target for the advanced phishing attacks that are designed to get through Microsoft 365 and secure email gateway detection and that, if successful,
can lead to service disruption that puts lives at risk. Watch this webinar and hear from guest speakers Stephen Bromhall and Dean Ayres, East of England A…

Anatomy of a Business Email Compromise

Anatomy of a Business Email Compromise

Channel Logo
Shawn Belovich, John Brewer, Kevin Golas, Nate Latessa, and Michael Sarlo

Business Email Compromise (BEC) has become a significant threat to organizations of all sizes, often resulting in hefty financial losses, operational
disruptions, and reputational damage. Learn from HaystackID’s seasoned cybersecurity experts how to detect and prevent BEC attacks during our upcoming
webcast, “Anatomy of a Business Email Compromise.” During the in-depth presentation, our team will guide you through the anatomy of a BEC attack, fro…

Linklaters: Using machine learning to make email DLP work in the real world

Linklaters: Using machine learning to make email DLP work in the real world

Channel Logo
Jon Segger, Head of Information Security at Linklaters LLP, & Tony Pepper, CEO of Egress, a KnowBe4 Company

91% of organizations experienced outbound email security incidents in their Microsoft 365 environment, with 86% suffering negative impacts as a result. As
clearly demonstrated, previous approaches to email data loss prevention (DLP) are ineffective at detecting and preventing these incidents, with static rules
unable to meet organizations’ demands and understand human behavior. A new approach is needed. Join this webinar to hear from Jon Segger, Head of I…

How to Protect Against Advanced Email Threats

How to Protect Against Advanced Email Threats

Channel Logo
Cary Hudgins, Michael Jones & Alyn Hockey at Fortra.

Organizations need comprehensive solutions to combat sophisticated threats. Your email security solution should include collecting threat intelligence,
mitigating against brand impersonation, and training employees on security awareness, all while maintaining compliance. That may sound like a tall order,
but with our experts’ overview of Fortra’s suite of email security solutions, you’ll learn: How threat-specific technology and operations deliver unparalleled t…

What's Making It Past Secure Email Gateways?

What's Making It Past Secure Email Gateways?

Channel Logo
John Wilson - Senior Fellow, Threat Research Fortra

How frequently are advanced threats actually bypassing your email security controls? One of the greatest challenges to protecting end users from high
impact email attacks is detecting identity deception. Fortra has conducted an analysis of real end user phishing reports to determine which advanced threat
types evade common secure email gateways and the frequency which they occur to better understand how enterprises can stop these attacks. John Wilso…