Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Latest Posts

Celebrating 5 Million Learners: The Evolution of KnowBe4's Compliance Plus

When you think of KnowBe4, you might immediately picture phishing simulations, password security modules, or other security awareness training topics. But today, we're celebrating a milestone that showcases just how far our Compliance Plus training offering has come: we've reached 5 million learners and over 10,000 customers worldwide! Compliance Plus offers training content that is typically boring, stale and drawn.

If Social Engineering Is 70% - 90% of Attacks, Why Aren't We Acting Like It?

Over a decade ago, I noticed that social engineering was the primary cause for all malicious hacking. It has been that way since the beginning of computers, but it took me about half of my 36-year career to realize it. At the time, I think everyone in cybersecurity knew social engineering was a big part of why hackers and their malware programs were so successful, but no one really knew how big.

What To Do if You Are a Victim of Fraud

If you are a victim of fraud, you should immediately protect your online accounts with strong passwords, collect evidence of the fraud, report it and freeze your credit. Fraud can occur in many ways, but cybercriminals who commit fraud intend to deceive you to steal money or other valuable information to potentially steal your identity. Think of fraud as an umbrella term for any deceptive act and identity theft as targeting your personal information to impersonate you and commit fraud in your name.

Dark Web monitoring: The linchpin of External Risk Management

The typical Security Operations Center (SOC) faces a wide variety of responsibilities. In addition to monitoring internal systems for signs of threats and breaches, modern SOCs are tasked with managing external risks through practices such as: Each of these practices addresses different types of risks, and it would be wrong to say that any one practice is fundamentally more important than the others.

Seven Use Cases for Remote Browser Isolation (RBI)

It’s important to know that not all Remote Browser Isolation (RBI) solutions address the same use cases. Some use cases a good RBI solution solves include monitoring third-party access to systems, auditing browser activity, enabling secure Bring Your Own Device (BYOD) and extending zero trust to browsers. Continue reading to learn what RBI is and explore some of its most common use cases.

How to Prevent Ransomware on Networks: Proven Strategies for Protection

Organizations around the world are increasingly vulnerable to ransomware attacks, expected to cause over $20 billion in damages by the end of 2024. These cyber attacks are capable of shutting down entire networks, disrupting services, and inflicting severe financial and reputational damage. Knowing how to prevent ransomware on networks is essential in safeguarding against these dangers.

AI vs. AI: Why fighting GenAI fraud requires a multi-layered approach

If The Terminator, The Matrix, and every other cyberpunk series taught us anything, it’s that you can’t fight the machines with machines alone. Daniel Lee is a product manager at Persona who loves collaborating with fellow Personerds! He likes biking around the bay area and exploring 'hole-in-the-wall' restaurants. Daniel Lee is a product manager at Persona who loves collaborating with fellow Personerds! He likes biking around the bay area and exploring 'hole-in-the-wall' restaurants.

Intelligent Data Classification: Transforming Google Drive Security

Our customers often tell us about how they implement manual classification policies. However, with several hundreds of files created daily, and constant sharing between teams, it becomes impossible to enforce secure sharing and sensitive data protection. Imagine that your sales team just accidentally shared a spreadsheet containing customer credit card details with an external vendor. Or perhaps your HR department stored employee health records in a folder that wasn't properly restricted.

Attackers Abuse DocuSign API to Send Authentic-Looking Invoices At Scale

In a concerning trend, cybercriminals are leveraging DocuSign's APIs to send fake invoices that appear strikingly authentic. Unlike traditional phishing scams that rely on deceptively crafted emails and malicious links, these incidents use genuine DocuSign accounts and templates to impersonate reputable companies, catching users and security tools off guard.