ARTICLE
Guide

CISO STRATEGY GUIDE: Quishing attacks in Microsoft 365

Quishing attacks in Microsoft 365 Quishing has surged in popularity with a 1400% rise since 2021, making it a prominent payload in all attacks.   Download this guide to understand:   • Why cybercriminals are turning to quishing • The latest quishing tactics • How CISOs can leverage a dual approach when detecting quishing attacks in Microsoft 365   ...more
Report

2024 Phishing Threat Trends

Sophisticated phishing threats are increasing—and so is the risk to your organisation. Since the beginning of 2024, cybercriminals have invested heavily in attacks that evade traditional detection.   Download the latest Phishing Threat Trends Report to understand the hot topics dominating the headlines, from the rise of ‘quishing’ and AI-powered attacks to the evolution of payloads in phishing campaigns. ...more
Guide

CISO STRATEGY GUIDE: Detecting impersonation attacks in Microsoft 365

Impersonation is the most popular form of social engineering used in phishing emails.   Download this guide to understand:   • The tactics cybercriminals use • Why do people fall victim to these attacks   How to detect impersonation-based phishing attacks in Microsoft 36  ...more
Infographic

IT Paves the Way to Spend Control: Managing spend has never been more complex – or critical

IT, along with finance, procurement, and supply chain managers, plays a critical role in helping the business manage its spending.  This is because: •  A growing number of employees are making more buying decisions. •  Remote working adds further complexity and visibility gaps in spending behaviors.  •  Different systems are used to manage different categories of spending such as travel, expenses, and invoices.  •  Regulatory requirements are ever-changing.   ...more
Newsfeed