Phishers exploit human nature, taking advantage of individuals, combining social psychology,...
GreatHorn Blogs
Featured
read more
Most Popular
More Blogs
2019 Trends, Challenges, and Benchmarks in Cloud Email Security
GreatHorn’s second annual Email Security: Trends, Challenges, and Benchmark Survey Report includes...
Combating Phishing with Modern Email Security: Evaluation Must-Haves (Part 3 of 3)
In this third and final part of our blog series on Combating Phishing with Modern Email Security,...
The Death of the SEG (Magic Quadrant) and the Rise of Email Security
Despite the arguably premature “retirement” of the Magic Quadrant, the email security market has never been hotter or needed more.
Combating Phishing with Modern Email Security (Part 2 of 3)
Last week, we discussed the evolution of email threats from nuisance spam to elusive phishing...
Combating Phishing with Modern Email Security: The Rise of Email-Borne Threats (Part 1 of 3)
In our three-part blog series, we'll debate the efficacy of traditional vs. modern email security....
Flipping the Script on Security Awareness Training
Ticking boxes and taking names? When it comes to security awareness training, are companies...