Blog

Email Gateways: Protecting the Wrong House While the Burglars Moved to a New Neighborhood

SEGs: Are They Worth The Money? It’s 2024, and yet here we are, still obsessing over Secure Email Gateways (SEGs) like they’re the ultimate savior of our cybersecurity woes. Every big-name cybersecurity company is still pushing them like it’s the only thing standing between us and total data disaster. Meanwhile, the hackers? They’ve moved on

Email Gateways: Protecting the Wrong House While the Burglars Moved to a New Neighborhood Read More »

Old habits, new threats: SEG’s and other phishing failures

Old Habits, New Threats Phishing has been around for over 20 years now.  Unfortunately, companies are using the same old habits they’ve been using year after year, and it just NOT working anymore.  Case in point:  91% of cybersecurity leaders are frustrated with their SEGs, and 87% are considering a replacement.  Why?  With the growing sophistication of attacks, SEG’s are becoming more porous. 

Old habits, new threats: SEG’s and other phishing failures Read More »

Invasion of the TOADs

The Invasion of the TOADs TOADs are an increasingly common threat to businesses worldwide, and it’s not the kind that hop.   Are you aware that there is an average of 10 million TOAD messages sent every month?  As a matter of fact, there have been as many as 13 million TOAD messaging in one month!

Invasion of the TOADs Read More »

109 Seconds to Disaster

109 Seconds to Disaster Phishing attacks show no signs of abating, and while email is still the main vector of these attacks, only 65% of phishing attacks are now in email.  Social media, browser and search engine, and messaging application attacks are on the rise, using malicious links to dupe employees and steal corporate assets.  Training and simulations are NOT working. 

109 Seconds to Disaster Read More »

Usain Bolt racing a snail

When Snails Race Usain Bolt: The Ludicrous Pace of Cybersecurity Progress

The Ludicrous Pace of Cybersecurity Progress “The only thing we learn from history is that we learn nothing from history.” – Friedrich Hegel In the symphony of history, there are moments when a quiet murmur of innovation steadily crescendos into a triumphant roar, signaling a pivotal shift in the paradigm. In this digital era, we find

When Snails Race Usain Bolt: The Ludicrous Pace of Cybersecurity Progress Read More »

The Myth of Security Awareness: Are You Practicing Bruce Lee Moves or Just Watching His Movies?

The Myth of Cybersecurity Awareness In the expansive and often overly dramatized theater of ‘Security Awareness,’ the narrative tends to replay like a scratched DVD stuck on loop. It’s a tale woven with the same enchanting threads that tell of unicorns prancing in moonlit meadows, magic carpets defying the very laws of physics, and, of

The Myth of Security Awareness: Are You Practicing Bruce Lee Moves or Just Watching His Movies? Read More »