Fortinet has announced the launch of its FortiMail Workspace Security suite, enhancing its data and productivity security portfolio. This suite positions FortiMail as the most comprehensive and ...
As the primary (and sometimes sole) channel for corporate communications, email has been the natural area of focus for cybersecurity vendors looking to develop effective defensive solutions against ...
Today, we are excited to announce Varonis Interceptor, AI-native email security. AI has enabled a new breed of email threats that are more deceptive than ever. By mimicking tone, language, branding, ...
Email security has long dominated the enterprise security conversation — and rightfully so. It remains a key vector for phishing, credential theft, and social engineering. But in 2025, the threat ...
SAN FRANCISCO--(BUSINESS WIRE)--Paubox, the leading provider of HIPAA compliant email security, today unveiled its most ambitious product release to date—Inbound Email Security, the AI-powered inbound ...
Cybersecurity software firm Malwarebytes Inc. today announced the launch of ThreatDown Email Security, a new email security module designed to combat email-based threats. The new module in the ...
SAN CARLOS, Calif., Feb. 29, 2024 (GLOBE NEWSWIRE) -- Check Point Software Technologies Ltd. (NASDAQ: CHKP), a leading AI-powered, cloud-delivered cyber security platform provider, solidifies its ...
The data security vendor is aiming to enter the email security segment through the acquisition of SlashNext, valued at up to $150 million. Varonis said Tuesday it’s aiming to enter the email security ...
A new phishing tool targeting Microsoft 365 users has entered the chat, further democratizing social engineering campaigns for lower-skilled cybercriminals. The tool, called Quantum Route Redirect, ...
‘We’re always going to sit in the middle and basically have to deal with rising alert volumes, giant telemetry repositories, faster IOCs [indicators of compromise] conversion, more containment,’ says ...
The systematic abuse of legitimate cloud applications has become a constant in the cybercriminal ecosystem. Throughout 2024, attackers continuously adapted their tactics, techniques and procedures, ...