Search
Close this search box.

Category: Blog

What are the Challenges of Data Classification

It’s often said in cybersecurity that it’s not a question of if an attack takes place but rather when. Ransomware tactics are evolving, deploying increasingly sophisticated and human approaches.

Why Data Classification is Important?

It’s often said in cybersecurity that it’s not a question of if an attack takes place but rather when. Ransomware tactics are evolving, deploying increasingly sophisticated and human approaches.

Understanding Data Classification

It’s often said in cybersecurity that it’s not a question of if an attack takes place but rather when. Ransomware tactics are evolving, deploying increasingly sophisticated and human approaches.

Analyzing behavior to protect against BEC attacks

Understanding “normal” behaviors in email exchanges are key to combating advanced phishing and BEC attacks by John Stevenson Detecting Business Email Compromise (BEC)  In the final part of our series of blogs on Business Email Compromise (BEC), it’s time to look at how AI, ML, and NLP all have a

Using NLP techniques to protect against BEC attacks

How Natural Language Programming help combat phishing and BEC attacks by John Stevenson Business Email Compromise (BEC)  Business Email Compromise (BEC) covers a range of email attacks that typically share a common core attribute. There is no obvious executable component, such as a URL or file attachment in the message

Phishing with QR codes

Don’t Scan or be Scammed By Maharlito Aquino, Kervin Alintanahin and Dexter To In 1994, a type of the matrix barcode known as the Quick Response code, now widely known as QR code, was invented by Masahiro Hara from a Japanese company Denso Wave. The purpose of the barcode was