Cyber Resilience Insights Blog
The latest news and cybersecurity industry analysis at your fingertips.
Generative AI Threats
Tools based on large language models, such as ChatGPT, can be used to generate convincing, well-worded, grammatically correct phishing emails at high volume. They can also be used to perform research on targets, both people and organizations. Business email compromise (BEC) attacks often involve a conversation between the attacker and the victim before the attacker achieves their objectives (rece...
Read moreExplore insights
Unfortunately we don't have any results matching your criteria, but you can try changing the selected filters above.
Special Collection
Securing Microsoft 365
Every day, organizations are exposed to unnecessary risk from attacks that could have been blocked; reliance on M365 protection alone may leave email vulnerable to attack. Here’s the key takeaway: Mass adoption of M365 has made it an irresistible target for cybercriminals. Explore this special collection of thought leadership about why it’s critical to secure M365.
Our Picks: Focus on Collaboration Security
Subscribe to Cyber Resilience Insights for more articles like these
Get all the latest news and cybersecurity industry analysis delivered right to your inbox
Sign up successful
Thank you for signing up to receive updates from our blog
We will be in touch!