Just as phishing has evolved, the way organisations detect and deflect these malicious messages must also change, looking at each distinct stages to a phishing attack - before, during and after.
Layered security isn't new. What is important today is choosing the correct layers. Your layered security approach should be constructed of multiple layers across the length and breadth of your complete IT environment.
Implementing the best defences, tools, process and technology can help mitigate an attack and quicken time to remediation. It's important to think about not only the tools, but the process, people, intelligence and technology.
Google issued a public apology on Thursday after a bug mistakenly caused its defences against malware, phishing, and spam to block some users' access to Google Docs files on 31 October.
Chris Dye explores how banks can use testing to prevent disasters and provides practical tips on how the sector can improve cyber-resiliency.
A free honeypot chock full of fake domain credentials has been created to educate administrators on trapping and blocking attackers.
With many in the IT security industry predicting the imminent demise of the firewall, Nimmy Reichenberg argues that it remains integral to protecting an organisation's networks.
John Smith, looks at the wealth of data churned up by cyber-security analytics and how vendors have a responsibility to make the numbers actionable.