Using open redirects takes phishing email deceptiveness – and therefore effectiveness -- up a notch by displaying a legit-seeming URL to users who are prudent enough to hover over a link.
Credential theft came roaring back in the first half of 2021 as the top phishing technique, with legitimate websites that have been compromised as the most popular staging ground.
Data from the first quarter of 2021 indicates that ransomware strains are becoming increasingly diverse and therefore more difficult to detect. Email and the web remain the dominant delivery channels, with one or both almost always included in often-complex delivery chains.
MPA Best Practice Guidelines Name RBI as Implementation Guidance Infrastructure for Web Filtering and Usage Control
In a recent move to ease web use – while rigorously protecting valuable content -- MPA Guidelines now recommend RBI for content producers and delivery companies. Here are some factors that MPA members should consider when choosing an RBI solution.
According to CEOs of major US banks, cybersecurity "may very well be the biggest threat to the US financial system." That’s why almost 90% of financial institutions are making improving cybersecurity risk management capabilities a top priority for the next two years.
Remote Browser Isolation solutions are not created equal. Here’s a quick guide to help you distinguish between solutions that are fully mature and those that use cludgy, older 1st gen RBI technology.
The huge REvil ransomware attack on the Kaseya supply chain reinforces the importance of clear cybersecurity guidelines. In this post, we weigh in on the definitions of critical software per the US executive order on improving cybersecurity.
Many insurance companies recommend cybersecurity measures to their policyholders. But there may be more they can do to keep attacks from succeeding.