Proving the Case for ML in Phishing Protection, with IRONSCALES - TechHQ
Cybersecurity teams have always had to adapt to new attack methods and change the tools they use to fit the organization's processes better. A prime example of adapting to fit ways of work is the increased preponderance of cloud-based business services and applications. If most of the company's work takes place on web-based SaaS platforms, perimeter-based cybersecurity protection loses importance, and CISOs start to look at cloud-based zero-trust frameworks, for example. Similarly, as more companies move their workflows to Google Suite or Office 365, the secure email gateway that protected the on-prem email server and clients gets mothballed in favor of ICES (integrated cloud email security) solutions. At the same time, agent-based endpoint protection that uses heuristic scanning or rule-based algorithms with pushed/pulled updates are proving more ineffective against very, very smart phishing attacks that exploit weaknesses in every device's "biological interface." User education in online hygiene may have a role in solving that problem, but even seasoned cybersecurity veterans reading these pages will know that they too have, in a moment of inattention, clicked the odd suspect link.
Apr-25-2022, 10:16:37 GMT