ITSPmagazine's Cybersecurity Chronicles

As you know, a chronicle |ˈkränək(ə)l| is a factual written account of important or historical events in the order of their occurrence. Well, sorry, that is not 'exactly' what this is.

This is a compilation of chronicles, in the sense that the pieces are written as facts happen but is also a diary, because to the report, we add a thought, an opinion, a question, and sometimes an answer.
 
We like to think of it as a mixture of comment and factual information. Because this, ultimately, is what ITSPmagazine does, or tries to do: make you think, ponder, consider, reflect, muse and hopefully act. 

Looking for something in particular? You can search by keyword, author, or company using the field below.


  Anti-Phishing Requires A Three-Pronged Strategy: technical controls, end-user controls and process automation.   This whitepaper explores how modern phishing techniques, such as business email compromise (BEC), ransomware, spear-phishing and advanced persistent threats (APTs) are meticulously designed to defeat traditional email security approaches and how IRONSCALES’ advanced threat protection platform is uniquely built to addresses the contemporary techniques of phishers.

Anti-Phishing Requires A Three-Pronged Strategy: technical controls, end-user controls and process automation.

This whitepaper explores how modern phishing techniques, such as business email compromise (BEC), ransomware, spear-phishing and advanced persistent threats (APTs) are meticulously designed to defeat traditional email security approaches and how IRONSCALES’ advanced threat protection platform is uniquely built to addresses the contemporary techniques of phishers.


The latest chronicles