Threats
Securing Emails from Image-based Phishing Attacks
By BUFFERZONE Team, 25/11/2024
Target: IT (Elementary) Tags: Isolation, Safe Workspace®, Zero-day, Safe Browser, Protection By Containment™, SafeBridge®,NoCloud®, Prevention, Email Security In the evolving landscape of cyber threats, attackers constantly adapt to evade detection.
Read More >The Next Cyber Threat: Conferencing and Collaboration
By BUFFERZONE Team, 11/07/2017
If you’re responsible for your organization’s IT security, you probably rely on email inspection and other perimeter gateway solutions for preventing potentially malicious files from entering your network. However, conferencing
Read More >Can Social Media be Compliantly Supervised? The RegTech Option
By BUFFERZONE Team, 14/06/2017
One of the most difficult compliance challenges faced by companies in the financial and health industries is the requirement to record and supervise employee communications over social media. Let’s take
Read More >Preventing the Next WannaCry
By BUFFERZONE Team, 7/06/2017
The recent WannaCry worldwide ransomware attack seems to have been successfully stopped for now. But what about the next similar attack? WannaCry Earlier this month (May 2017), organizations worldwide were
Read More >Financial Services Organizations: How to Stop the “Other” Social Media Threat
By BUFFERZONE Team, 5/02/2017
When it comes to guarding against data leaks, financial services organizations have been on high alert for several years. Unfortunately, this is a case where widespread fear is actually a
Read More >Zero-Day Attacks: The More Things Change, the More they Stay the Same
By BUFFERZONE Team, 14/11/2016
Nineteenth century French novelist Jean-Baptise Alphonse Karr is credited with coining the phrase “the more things change, the more they stay the same”. While this astute observation still applies to
Read More >