Communications Security

Communications Security | News, how-tos, features, reviews, and videos

cisco logo fit
5G mobile wireless network

Cybersecurity  >  Email security threats, such as phishing

A formula for measuring real-world email security efficacy

You have the data needed to assess the efficacy of your email security tools. Here's how to use it.

email security risk - phishing / malware

Microsoft help files repurposed to contain Vidar malware in new campaign

A new email malware campaign hides a malicious payload in what appears to be a Microsoft Compiled HTML Help file.

incoming emails / DNS security / locked server / parked domain

Cloudflare unveils email security tools, free WAF ruleset, and API gateway

Cloudflare has announced a slew of new products, including a suite of email security tools for phishing and malware detection, a free WAF ruleset and a machine-learning powered API gateway.

Cybersecurity  >  Email security threats, such as phishing

INTERPOL and Nigerian Police bust business email compromise ring, arrest 11

Operation Falcon II focused on malware skills and knowledge to track suspects thought to be members of the SilverTerrier BEC network that has harmed thousands of companies globally.

business travel / airport terminal walkway / traveller

CISOs, what's in your travel security program?

It's time to review (or create) your travel security program now that more people are traveling for work and pleasure. Here's what it should include.

video conferencing / remote work

9 video chat apps compared: Which is best for security?

Zoom, Microsoft Teams, Google Meet, Cisco Webex, FaceTime, Tauria, Signal, Wire and WhatsApp. What does their encryption look like? What are the trade-offs?

email security lock breach protocol by microstockhub getty

9 cloud and on-premises email security suites compared

These email security suites have evolved to keep pace with email-enabled threats.

emergency disaster recovery business continuity binary by dsgpro getty images 182712891

Microsoft Exchange Emergency Mitigation: What admins need to know

The Emergency Mitigation service adds protections to Exchange Server in the wake of recent zero-day compromises.

Cybersecurity  >  Email security threats, such as phishing

4 steps to protect the C-suite from business email compromise attacks

Preventing top executives from becoming BEC victims requires a different approach. Putting the risk in business terms is key.

cso security hack breach water leak gettyimages 466029458 by firmafotografen 2400x1600px

Exchange Autodiscover feature can cause Outlook to leak credentials

A design issue in the Microsoft Exchange Autodiscover feature can cause Outlook and other third-party Exchange client applications to leak plaintext Windows domain credentials to external servers. Here’s what companies can do now to...

Cybersecurity  >  Email security threats, such as phishing

Unpatched Exchange Servers an overlooked risk

Attackers are targeting older, unpatched Microsoft Exchange Servers with much success because organizations don't properly assess the risk.

Cybersecurity  >  Email security threats, such as phishing

Business email compromise (BEC) attacks take phishing to the next level

Business email compromise (BEC) is a highly targeted, email-based attack that tricks victims into exposing company information, handing over money, or getting them to perform other acts that negatively impact the business.

A hook is cast at laptop email with fishing lures amid abstract data.
Tip

4 steps to prevent spear phishing

Your users are in the crosshairs of the best attackers out there. Follow these steps to better protect them.

CSO > Invalidated cyber insurance

17 cyber insurance application questions you'll need to answer

Recent high-profile security incidents have tightened requirements to qualify for cyber insurance. These are the tougher questions insurance carriers are now asking.

Detecting phishing attempts  >  A magnifying lens spots a hook trying to catch a fish.

5 best practices for conducting ethical and effective phishing tests

Phishing tests have become a popular feature of cybersecurity training programs, but they should follow ethical frameworks to ensure they don’t do more harm than good.

Social media threats / risks / dangers / headaches  >  Text bubbles bearing danger signs

4 tips for partnering with marketing on social media security

Threat actors watch social media accounts to gather intelligence about a targeted company. Here's how to get marketing to work with security to minimize the risk.

supply chain management connections - ERP - Enterprise Resource Planning

China’s exclusion from US 5G market likely to continue with Biden administration

Telecom insiders discuss supply chain security and call for better communication, collaboration, and transparency from the federal government about threats within their industry.

microsoft 365 channel attributes apps

New Microsoft 365 defaults, Application Guard beta add email protections

Microsoft has made it harder for attackers to redirect email responses or leverage malicious attachments. Here's how to review the impact these new features will have on your business.

Load More
You Might Also Like