This quarter, we provide extensive background on the evolution of phishing and review the latest phishing statistics. We also explore machine learning, a critical technique in phishing detection, with insight from Webroot CTO Hal Lonas, and ESG analyst Jon Oltsik.
          
            
            
              
                
                  Phishing: no longer casting a wide net                
                
              Phishing remains one of the most challenging threats to identify, but attackers have changed course. The latest tactics use pinpoint precision to target specific companies and individuals, going for quality over quantity. Learn more about the dangers of phishing and which companies are the most desirable catch.
              
                
                  Read More                
                
             
           
          
          
            
            
              
                
                  Man + machine learning = superior threat intelligence                
                
              The volume of data to be analyzed and the speed at which threats evolve requires more than manual analysis to keep pace. Webroot CTO Hal Lonas explains why machine learning is the game changer in threat intelligence.
              
                
                  Watch Video                
                
             
           
          
          
            
            
              
                
                  Operationalizing TI by integrating into security controls                
                
                
                  by Jon Oltsik, Senior Principal Analyst, ESG                
                
              Many organizations are building threat intelligence programs, but acting on mountains of threat data is challenging and staffing shortages compound the problem. So what’s the solution?
              
                
                  Read More                
                
             
           
          
          
            
            
              
                
                   Automating threat defense: using machine learning to prevent modern cyberattacks                
                
              “Machine learning” may be a frequently used term, but the techniques vary wildly. Arm yourself with accurate information for the next conversation on the subject.
              
                
                  Read More