CXO BytesThe Evolution of Email Security for Greater Business SafetyDebasish Mukherjee2 years agoJune 30, 2022 Work from home compels a new approach for email security as businesses try to stay ahead of mounting cybersecurity threats...
CXO BytesBest Practices for Protecting Against Phishing, Ransomware and Email FraudDebasish Mukherjee2 years agoJune 15, 2022Security teams and the organizations they support live in difficult times: they increasingly are the targets of sophisticated threats developed...
Corner OfficeCXO BytesToday’s Firewall is More Important in a Multi-Perimeter World New cornerstone for enterprise securityDebasish Mukherjee2 years agoApril 19, 2022Cloud computing, virtualization, mobility and now expansive work-from-home policies have dramatically changed how organizations conduct business. Anywhere, anytime access fosters...
Corner OfficeCXO BytesBusiness Email Compromise: All you need to knowDebasish Mukherjee2 years agoMarch 10, 2022Business email compromise (BEC) attacks have not engendered the same level of notoriety as ransomware attacks but rank in combination...
Corner OfficeCXO BytesSecurityFighting the Phish: How to Protect Your Business from Phishing AttackDebasish Mukherjee2 years agoFebruary 8, 2022While the basic pattern is much the same as the first phishing campaigns, the scammers have added new twists with both the script and the payoff.