Questions? Feedback? powered by Olark live chat software

Blog

Insights and Opinions From the Agari Team

RSA 2017: Enabling Business by Defending the Human Computer

RSA 2017 saw a number of exciting announcements and developments in the world of security. Microsoft called for a Digital Geneva Convention, many experts warned against an over-reliance on artificial intelligence (AI) to defend against cyberattacks, and ransomware was a ubiquitous topic as a new report from the SANS Institute named it the top security […]

Read More

Email Security: User Experience of the Email Recipient

social engineering

In my previous blog post, I discussed the two phases of email filtering in the open quarantine process that can help prevent social engineering-based email attacks. The first phase deals with how to identify high-risk situations. However, due to the complex nature of cybersecurity, these situations don’t necessarily correspond to a certainty of attacks. As […]

Read More

The 2 Phases of Email Filtering

social engineering

In my previous blog post, I introduced the concept of open quarantine. This week, I’d like to explore the two phases of email filtering that make up the open quarantine process. Phase 1 The notion of open quarantine depends on being able to perform a tripartite classification of messages into good, bad and undetermined, where […]

Read More

Email Filtering and Open Quarantine – The Paradigm Shift

social engineering

In my previous blog post, I provided examples of the growing sophistication – and subsequent success – of several high-visibility email attacks that used social engineering to evade traditional email security filters. This week, I’d like to introduce a new filtering paradigm: open quarantine. Open quarantine balances the needs of security and usability using a […]

Read More

Deceptive Emails and Other Types of Cyberattacks

social engineering

In my previous blog post, I provided examples of the growing sophistication – and subsequent success – of several high-visibility email attacks. This week, I’d like to look at the different types of emails that are enabling these attacks. Deceptive emails are used by cyberattackers to carry out three different types of attacks: To coerce […]

Read More

Addressing Sophisticated Email Attacks

social engineering

Just ten years ago, Internet security abuses were almost synonymous with small-time crime, e.g., poorly spelled email messages used in attempts to steal banking credentials. The threat is very different these days. Starting in 2007, nation states started using cyberattacks to accomplish political goals. In the first high-profile case, prompted by political tensions between Estonia […]

Read More